Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe

Overview

General Information

Sample name:1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe
Analysis ID:1525554
MD5:af9d6cdc4ff098c170ad543c236e6e0a
SHA1:eb3dd66a5e96512f94fd29b07d2ac277d66b30b6
SHA256:372cbc51a06856ab5865659790ec01821c095afda53e177256eebe1ae4af5b6a
Tags:base64-decodedexeuser-abuse_ch
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Installs a global keyboard hook
Machine Learning detection for sample
Uses dynamic DNS services
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "ab9001.ddns.net:31944:1", "Assigned name": "OCTOBERs", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "VLC.exe", "Startup value": "Rmc", "Hide file": "Disable", "Mutex": "Chrorne-CKQJ2Y", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeJoeSecurity_RemcosYara detected Remcos RATJoe Security
    1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeWindows_Trojan_Remcos_b296e965unknownunknown
    • 0x679e0:$a1: Remcos restarted by watchdog!
    • 0x67f38:$a3: %02i:%02i:%02i:%03i
    • 0x682bd:$a4: * Remcos v
    1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeREMCOS_RAT_variantsunknownunknown
    • 0x629e4:$str_a1: C:\Windows\System32\cmd.exe
    • 0x62960:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
    • 0x62960:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
    • 0x61e10:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
    • 0x62648:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
    • 0x61a0c:$str_b2: Executing file:
    • 0x62b28:$str_b3: GetDirectListeningPort
    • 0x62408:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
    • 0x62630:$str_b7: \update.vbs
    • 0x61a34:$str_b9: Downloaded file:
    • 0x61a20:$str_b10: Downloading file:
    • 0x61ac4:$str_b12: Failed to upload file:
    • 0x62af0:$str_b13: StartForward
    • 0x62b10:$str_b14: StopForward
    • 0x625d8:$str_b15: fso.DeleteFile "
    • 0x6256c:$str_b16: On Error Resume Next
    • 0x62608:$str_b17: fso.DeleteFolder "
    • 0x61ab4:$str_b18: Uploaded file:
    • 0x61a74:$str_b19: Unable to delete:
    • 0x625a0:$str_b20: while fso.FileExists("
    • 0x61f49:$str_c0: [Firefox StoredLogins not found]
    1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeINDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewerdetects Windows exceutables potentially bypassing UAC using eventvwr.exeditekSHen
    • 0x61900:$s1: \Classes\mscfile\shell\open\command
    • 0x61960:$s1: \Classes\mscfile\shell\open\command
    • 0x61948:$s2: eventvwr.exe
    SourceRuleDescriptionAuthorStrings
    C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.3790231384.000000000227F000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000000.00000000.1345113615.0000000000456000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
            • 0x131e0:$a1: Remcos restarted by watchdog!
            • 0x13738:$a3: %02i:%02i:%02i:%03i
            • 0x13abd:$a4: * Remcos v
            00000000.00000000.1345113615.0000000000456000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
            • 0x131e0:$a1: Remcos restarted by watchdog!
            • 0x13738:$a3: %02i:%02i:%02i:%03i
            • 0x13abd:$a4: * Remcos v
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            0.2.1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
              0.0.1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                0.2.1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe.400000.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                • 0x679e0:$a1: Remcos restarted by watchdog!
                • 0x67f38:$a3: %02i:%02i:%02i:%03i
                • 0x682bd:$a4: * Remcos v
                0.0.1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe.400000.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                • 0x679e0:$a1: Remcos restarted by watchdog!
                • 0x67f38:$a3: %02i:%02i:%02i:%03i
                • 0x682bd:$a4: * Remcos v
                0.2.1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe.400000.0.unpackREMCOS_RAT_variantsunknownunknown
                • 0x629e4:$str_a1: C:\Windows\System32\cmd.exe
                • 0x62960:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x62960:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x61e10:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                • 0x62648:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                • 0x61a0c:$str_b2: Executing file:
                • 0x62b28:$str_b3: GetDirectListeningPort
                • 0x62408:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                • 0x62630:$str_b7: \update.vbs
                • 0x61a34:$str_b9: Downloaded file:
                • 0x61a20:$str_b10: Downloading file:
                • 0x61ac4:$str_b12: Failed to upload file:
                • 0x62af0:$str_b13: StartForward
                • 0x62b10:$str_b14: StopForward
                • 0x625d8:$str_b15: fso.DeleteFile "
                • 0x6256c:$str_b16: On Error Resume Next
                • 0x62608:$str_b17: fso.DeleteFolder "
                • 0x61ab4:$str_b18: Uploaded file:
                • 0x61a74:$str_b19: Unable to delete:
                • 0x625a0:$str_b20: while fso.FileExists("
                • 0x61f49:$str_c0: [Firefox StoredLogins not found]
                Click to see the 3 entries

                Stealing of Sensitive Information

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, ProcessId: 7824, TargetFilename: C:\ProgramData\remcos\logs.dat
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-04T11:34:34.955076+020020365941Malware Command and Control Activity Detected192.168.2.94972564.188.16.15731944TCP
                2024-10-04T11:34:57.329750+020020365941Malware Command and Control Activity Detected192.168.2.94985064.188.16.15731944TCP
                2024-10-04T11:35:19.752659+020020365941Malware Command and Control Activity Detected192.168.2.94997464.188.16.15731944TCP
                2024-10-04T11:35:42.128299+020020365941Malware Command and Control Activity Detected192.168.2.94997664.188.16.15731944TCP
                2024-10-04T11:36:04.519512+020020365941Malware Command and Control Activity Detected192.168.2.94997764.188.16.15731944TCP
                2024-10-04T11:36:26.913999+020020365941Malware Command and Control Activity Detected192.168.2.94997864.188.16.15731944TCP
                2024-10-04T11:36:49.334368+020020365941Malware Command and Control Activity Detected192.168.2.94997964.188.16.15731944TCP
                2024-10-04T11:37:11.721647+020020365941Malware Command and Control Activity Detected192.168.2.94998064.188.16.15731944TCP
                2024-10-04T11:37:34.116208+020020365941Malware Command and Control Activity Detected192.168.2.94998164.188.16.15731944TCP
                2024-10-04T11:37:56.538639+020020365941Malware Command and Control Activity Detected192.168.2.94998264.188.16.15731944TCP
                2024-10-04T11:38:18.925581+020020365941Malware Command and Control Activity Detected192.168.2.94998364.188.16.15731944TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeAvira: detected
                Source: 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "ab9001.ddns.net:31944:1", "Assigned name": "OCTOBERs", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "VLC.exe", "Startup value": "Rmc", "Hide file": "Disable", "Mutex": "Chrorne-CKQJ2Y", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                Source: ab9001.ddns.netVirustotal: Detection: 15%Perma Link
                Source: ab9001.ddns.netVirustotal: Detection: 15%Perma Link
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeVirustotal: Detection: 83%Perma Link
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeReversingLabs: Detection: 89%
                Source: Yara matchFile source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, type: SAMPLE
                Source: Yara matchFile source: 0.2.1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.3790231384.000000000227F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.1345113615.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe PID: 7824, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeJoe Sandbox ML: detected
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_004315EC CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,0_2_004315EC
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_dfbdb724-c
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,0_2_0041A01B
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,0_2_0040B28E
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_0040838E
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_004087A0
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,0_2_00407848
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_004068CD FindFirstFileW,FindNextFileW,0_2_004068CD
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_0044BA59 FindFirstFileExA,0_2_0044BA59
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_0040AA71
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,0_2_00417AAB
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,0_2_0040AC78
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_00406D28 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,0_2_00406D28

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.9:49725 -> 64.188.16.157:31944
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.9:49850 -> 64.188.16.157:31944
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.9:49979 -> 64.188.16.157:31944
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.9:49974 -> 64.188.16.157:31944
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.9:49978 -> 64.188.16.157:31944
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.9:49977 -> 64.188.16.157:31944
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.9:49982 -> 64.188.16.157:31944
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.9:49980 -> 64.188.16.157:31944
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.9:49976 -> 64.188.16.157:31944
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.9:49981 -> 64.188.16.157:31944
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.9:49983 -> 64.188.16.157:31944
                Source: Malware configuration extractorURLs: ab9001.ddns.net
                Source: unknownDNS query: name: ab9001.ddns.net
                Source: global trafficTCP traffic: 192.168.2.9:49725 -> 64.188.16.157:31944
                Source: Joe Sandbox ViewIP Address: 64.188.16.157 64.188.16.157
                Source: Joe Sandbox ViewASN Name: ASN-QUADRANET-GLOBALUS ASN-QUADRANET-GLOBALUS
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_00424A66 recv,0_2_00424A66
                Source: global trafficDNS traffic detected: DNS query: ab9001.ddns.net
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeString found in binary or memory: http://geoplugin.net/json.gp
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeString found in binary or memory: http://geoplugin.net/json.gp/C

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_00409340 SetWindowsHookExA 0000000D,0040932C,000000000_2_00409340
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeJump to behavior
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_0040A65A OpenClipboard,GetClipboardData,CloseClipboard,0_2_0040A65A
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_00414EC1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_00414EC1
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_0040A65A OpenClipboard,GetClipboardData,CloseClipboard,0_2_0040A65A
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_00409468 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,0_2_00409468

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, type: SAMPLE
                Source: Yara matchFile source: 0.2.1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.3790231384.000000000227F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.1345113615.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe PID: 7824, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_0041A76C SystemParametersInfoW,0_2_0041A76C

                System Summary

                barindex
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, type: SAMPLEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, type: SAMPLEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                Source: 0.2.1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.0.1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 0.2.1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                Source: 0.0.1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 0.0.1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                Source: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 00000000.00000000.1345113615.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe PID: 7824, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_00414DB4 ExitWindowsEx,LoadLibraryA,GetProcAddress,0_2_00414DB4
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_004251520_2_00425152
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_004352860_2_00435286
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_004513D40_2_004513D4
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_0045050B0_2_0045050B
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_004365100_2_00436510
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_004316FB0_2_004316FB
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_0043569E0_2_0043569E
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_004437000_2_00443700
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_004257FB0_2_004257FB
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_004128E30_2_004128E3
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_004259640_2_00425964
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_0041B9170_2_0041B917
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_0043D9CC0_2_0043D9CC
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_00435AD30_2_00435AD3
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_00424BC30_2_00424BC3
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_0043DBFB0_2_0043DBFB
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_0044ABA90_2_0044ABA9
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_00433C0B0_2_00433C0B
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_00434D8A0_2_00434D8A
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_0043DE2A0_2_0043DE2A
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_0041CEAF0_2_0041CEAF
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_00435F080_2_00435F08
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: String function: 00402073 appears 51 times
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: String function: 00432B90 appears 53 times
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: String function: 00432525 appears 42 times
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, type: SAMPLEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                Source: 0.2.1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.0.1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 0.2.1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                Source: 0.0.1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 0.0.1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                Source: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 00000000.00000000.1345113615.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe PID: 7824, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: classification engineClassification label: mal100.rans.troj.spyw.evad.winEXE@1/1@4/1
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_00415C90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,0_2_00415C90
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_0040E2E7 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,CloseHandle,0_2_0040E2E7
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_00419493 FindResourceA,LoadResource,LockResource,SizeofResource,0_2_00419493
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_00418A00 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_00418A00
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeMutant created: \Sessions\1\BaseNamedObjects\Chrorne-CKQJ2Y
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCommand line argument: Software\0_2_0040D3F0
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCommand line argument: Chrorne-CKQJ2Y0_2_0040D3F0
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCommand line argument: Exe0_2_0040D3F0
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCommand line argument: Exe0_2_0040D3F0
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCommand line argument: Chrorne-CKQJ2Y0_2_0040D3F0
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCommand line argument: (#G0_2_0040D3F0
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCommand line argument: Inj0_2_0040D3F0
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCommand line argument: Inj0_2_0040D3F0
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCommand line argument: Inj0_2_0040D3F0
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCommand line argument: Chrorne-CKQJ2Y0_2_0040D3F0
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCommand line argument: origmsc0_2_0040D3F0
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCommand line argument: Rmc0_2_0040D3F0
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCommand line argument: XIK0_2_0040D3F0
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCommand line argument: XIK0_2_0040D3F0
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCommand line argument: XIK0_2_0040D3F0
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCommand line argument: H"G0_2_0040D3F0
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCommand line argument: XIK0_2_0040D3F0
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCommand line argument: exepath0_2_0040D3F0
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCommand line argument: H"G0_2_0040D3F0
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCommand line argument: exepath0_2_0040D3F0
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCommand line argument: XIK0_2_0040D3F0
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCommand line argument: licence0_2_0040D3F0
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCommand line argument: `"G0_2_0040D3F0
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCommand line argument: Administrator0_2_0040D3F0
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCommand line argument: User0_2_0040D3F0
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeVirustotal: Detection: 83%
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeReversingLabs: Detection: 89%
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeSection loaded: cryptbase.dllJump to behavior
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041A8DA
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_004542E6 push ecx; ret 0_2_004542F9
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_00432BD6 push ecx; ret 0_2_00432BE9
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_00454C08 push eax; ret 0_2_00454C26
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_004063C6 ShellExecuteW,URLDownloadToFileW,0_2_004063C6
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_00418A00 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_00418A00
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041A8DA
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_0040E18D Sleep,ExitProcess,0_2_0040E18D
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,0_2_004186FE
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeWindow / User API: threadDelayed 5450Jump to behavior
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeWindow / User API: threadDelayed 4039Jump to behavior
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeWindow / User API: foregroundWindowGot 1775Jump to behavior
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeAPI coverage: 8.5 %
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe TID: 7848Thread sleep count: 235 > 30Jump to behavior
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe TID: 7848Thread sleep time: -117500s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe TID: 7852Thread sleep count: 5450 > 30Jump to behavior
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe TID: 7852Thread sleep time: -16350000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe TID: 7852Thread sleep count: 4039 > 30Jump to behavior
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe TID: 7852Thread sleep time: -12117000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,0_2_0041A01B
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,0_2_0040B28E
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_0040838E
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_004087A0
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,0_2_00407848
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_004068CD FindFirstFileW,FindNextFileW,0_2_004068CD
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_0044BA59 FindFirstFileExA,0_2_0044BA59
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_0040AA71
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,0_2_00417AAB
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,0_2_0040AC78
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_00406D28 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,0_2_00406D28
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll-
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeAPI call chain: ExitProcess graph end nodegraph_0-46845
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004327AE
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041A8DA
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_004407B5 mov eax, dword ptr fs:[00000030h]0_2_004407B5
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_00410763 SetLastError,GetNativeSystemInfo,SetLastError,GetProcessHeap,HeapAlloc,SetLastError,0_2_00410763
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004327AE
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_004328FC SetUnhandledExceptionFilter,0_2_004328FC
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_004398AC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004398AC
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_00432D5C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00432D5C
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe0_2_00410B5C
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_004175E1 mouse_event,0_2_004175E1
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerhn
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerijk)
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerc
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerEM
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managers.net:31944
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerPjr)
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerXe!)
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager4eE)
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager]n&)
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerfj`)
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager,
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager)e^)
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerina/
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerZn
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerOn()P
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerCe()
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager1
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager&eW)
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerM(
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager>
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmp, logs.dat.0.drBinary or memory string: [Program Manager]
                Source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerMe:)
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_004329DA cpuid 0_2_004329DA
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: EnumSystemLocalesW,0_2_0044F17B
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: EnumSystemLocalesW,0_2_0044F130
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: EnumSystemLocalesW,0_2_0044F216
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_0044F2A3
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: GetLocaleInfoA,0_2_0040E2BB
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: GetLocaleInfoW,0_2_0044F4F3
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0044F61C
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: GetLocaleInfoW,0_2_0044F723
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0044F7F0
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: EnumSystemLocalesW,0_2_00445914
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: GetLocaleInfoW,0_2_00445E1C
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_0044EEB8
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_0040A0B0 GetLocalTime,wsprintfW,0_2_0040A0B0
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_004195F8 GetComputerNameExW,GetUserNameW,0_2_004195F8
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: 0_2_004466BF _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_004466BF
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, type: SAMPLE
                Source: Yara matchFile source: 0.2.1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.3790231384.000000000227F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.1345113615.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe PID: 7824, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data0_2_0040A953
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\0_2_0040AA71
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: \key3.db0_2_0040AA71

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, type: SAMPLE
                Source: Yara matchFile source: 0.2.1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.0.1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.3790231384.000000000227F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000000.1345113615.0000000000456000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe PID: 7824, type: MEMORYSTR
                Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                Source: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exeCode function: cmd.exe0_2_0040567A
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Native API
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                Deobfuscate/Decode Files or Information
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services11
                Archive Collected Data
                11
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts12
                Command and Scripting Interpreter
                1
                Windows Service
                1
                Access Token Manipulation
                2
                Obfuscated Files or Information
                211
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol211
                Input Capture
                2
                Encrypted Channel
                Exfiltration Over Bluetooth1
                Defacement
                Email AddressesDNS ServerDomain Accounts2
                Service Execution
                Logon Script (Windows)1
                Windows Service
                1
                DLL Side-Loading
                2
                Credentials In Files
                1
                System Service Discovery
                SMB/Windows Admin Shares3
                Clipboard Data
                1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook11
                Process Injection
                1
                Virtualization/Sandbox Evasion
                NTDS2
                File and Directory Discovery
                Distributed Component Object ModelInput Capture1
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Access Token Manipulation
                LSA Secrets23
                System Information Discovery
                SSHKeylogging21
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                Process Injection
                Cached Domain Credentials21
                Security Software Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
                Virtualization/Sandbox Evasion
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem2
                Process Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                Application Window Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                System Owner/User Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe83%VirustotalBrowse
                1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe89%ReversingLabsWin32.Trojan.Remcos
                1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe100%AviraBDS/Backdoor.Gen
                1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                s-part-0032.t-0009.t-msedge.net0%VirustotalBrowse
                ab9001.ddns.net16%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://geoplugin.net/json.gp0%URL Reputationsafe
                http://geoplugin.net/json.gp/C0%URL Reputationsafe
                ab9001.ddns.net16%VirustotalBrowse
                NameIPActiveMaliciousAntivirus DetectionReputation
                s-part-0032.t-0009.t-msedge.net
                13.107.246.60
                truefalseunknown
                ab9001.ddns.net
                64.188.16.157
                truetrueunknown
                NameMaliciousAntivirus DetectionReputation
                ab9001.ddns.nettrueunknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://geoplugin.net/json.gp1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exefalse
                • URL Reputation: safe
                unknown
                http://geoplugin.net/json.gp/C1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exefalse
                • URL Reputation: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                64.188.16.157
                ab9001.ddns.netUnited States
                8100ASN-QUADRANET-GLOBALUStrue
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1525554
                Start date and time:2024-10-04 11:33:21 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 6m 18s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:6
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe
                Detection:MAL
                Classification:mal100.rans.troj.spyw.evad.winEXE@1/1@4/1
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 26
                • Number of non-executed functions: 201
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Override analysis time to 240s for sample files taking high CPU consumption
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                TimeTypeDescription
                05:34:44API Interceptor7283175x Sleep call for process: 1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe modified
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                64.188.16.157PDFDQ_P01_303B9367_2024-10-03_185650.vbsGet hashmaliciousRemcosBrowse
                  Faktura.vbsGet hashmaliciousRemcosBrowse
                    1722601625e1f9a4f530f6395665807ae8da7c9d13076e57dbdc05cedb2ad13cd85af8a931941.dat-decoded.exeGet hashmaliciousRemcosBrowse
                      PO#2195112.vbsGet hashmaliciousRemcosBrowse
                        BL-RTM1439068.vbsGet hashmaliciousGuLoader, RemcosBrowse
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          s-part-0032.t-0009.t-msedge.netfile.exeGet hashmaliciousLummaC, VidarBrowse
                          • 13.107.246.60
                          https://www.google.de/url?q=8Oshpephqbbshop&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=XS40i2Jop98hjgaswD&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkOuteybdtwrQvao&ved=HXUursu8uE=&url=amp%2Fgvhs2020.com%2Fgtaowpqtwp%3Fe%3Dhttps%3A%2F%2Foutlook.office.comGet hashmaliciousUnknownBrowse
                          • 13.107.246.60
                          Aura.exeGet hashmaliciousRedLineBrowse
                          • 13.107.246.60
                          https://forms.office.com/Pages/ResponsePage.aspx?id=4mPIUn7HtEOifSf_jkD9akHPEdQOqpJDoTs5yuUf8txUMEFQTE42TU03SUJBSU84VTY3MEtFR1JaUS4uGet hashmaliciousHTMLPhisherBrowse
                          • 13.107.246.60
                          https://t.co/dvIdjH2XsvGet hashmaliciousUnknownBrowse
                          • 13.107.246.60
                          http://185.95.84.78/rd/4gmsyP17223JZmx332lihotmtcwn9842ZSCGIOAIIATLJCU85240TITV3606d9Get hashmaliciousPhisherBrowse
                          • 13.107.246.60
                          https://1drv.ms/o/c/fdad16d5f2338a27/Eo8O_nGS-PdFnAhpolmsW1cBd-Jv5WSSl5AjZZuAQUSXNw?e=5%3aI9hXvq&sharingv2=true&fromShare=true&at=9Get hashmaliciousUnknownBrowse
                          • 13.107.246.60
                          http://perweierscotish.onlineGet hashmaliciousHtmlDropperBrowse
                          • 13.107.246.60
                          http://144.126.159.102Get hashmaliciousUnknownBrowse
                          • 13.107.246.60
                          http://144.126.159.102Get hashmaliciousUnknownBrowse
                          • 13.107.246.60
                          ab9001.ddns.netPDFDQ_P01_303B9367_2024-10-03_185650.vbsGet hashmaliciousRemcosBrowse
                          • 64.188.16.157
                          17279403650462a4446b0544f642ac8b8bfcc15d509532db8c51a2409d13eb777eadc7c636999.dat-decoded.exeGet hashmaliciousRemcosBrowse
                          • 45.133.172.96
                          Purchase Order - PO14895.vbsGet hashmaliciousRemcosBrowse
                          • 45.133.172.96
                          Faktura.vbsGet hashmaliciousRemcosBrowse
                          • 64.188.16.157
                          1722601625e1f9a4f530f6395665807ae8da7c9d13076e57dbdc05cedb2ad13cd85af8a931941.dat-decoded.exeGet hashmaliciousRemcosBrowse
                          • 64.188.16.157
                          PO#2195112.vbsGet hashmaliciousRemcosBrowse
                          • 64.188.16.157
                          BL-RTM1439068.vbsGet hashmaliciousGuLoader, RemcosBrowse
                          • 64.188.16.157
                          SWIFT 103 202405291545524610 290524.vbsGet hashmaliciousGuLoader, RemcosBrowse
                          • 94.156.64.200
                          Swift mt103 483932024.vbsGet hashmaliciousGuLoader, RemcosBrowse
                          • 94.156.67.228
                          Forandringsstnings.vbsGet hashmaliciousGuLoader, RemcosBrowse
                          • 94.156.67.228
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          ASN-QUADRANET-GLOBALUSPDFDQ_P01_303B9367_2024-10-03_185650.vbsGet hashmaliciousRemcosBrowse
                          • 64.188.16.157
                          rpedido-002297.exeGet hashmaliciousFormBook, GuLoaderBrowse
                          • 104.223.44.195
                          PO906-645S790768.xlam.xlsxGet hashmaliciousUnknownBrowse
                          • 66.63.187.171
                          hesaphareketi__20241001.exeGet hashmaliciousAgentTeslaBrowse
                          • 104.247.165.99
                          novo.ppc440fp.elfGet hashmaliciousMirai, MoobotBrowse
                          • 185.121.176.226
                          Quote List.scr.exeGet hashmaliciousXenoRATBrowse
                          • 66.63.168.142
                          58ADE05412907F657812BDA267C43288EA79418091.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                          • 66.63.187.123
                          New Order.docGet hashmaliciousSnake KeyloggerBrowse
                          • 66.63.187.123
                          http://telegram.beethovenstore.com/Get hashmaliciousUnknownBrowse
                          • 104.247.162.201
                          https://83153.cc/Get hashmaliciousUnknownBrowse
                          • 27.0.235.36
                          No context
                          No context
                          Process:C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):144
                          Entropy (8bit):3.3603882199736725
                          Encrypted:false
                          SSDEEP:3:rhlKlM+VlZIWlDfMfWl5JWRal2Jl+7R0DAlBG45klovDl6v:6lJCWRf5YcIeeDAlOWAv
                          MD5:6ACE5876B0140A058CE242F5204A005A
                          SHA1:AB082D8F974DE6E2E6148C3B1355F3BA47D80555
                          SHA-256:F72666B38E0E51401604EE43CE87FBB155C8C072BB10CF728058BCB4B61178F1
                          SHA-512:8B6E932650E033DF83CB6C8B30299974839E9099B882417AA5DDABA8FD9EABA311FBF8015360BD5700ED1B23EFF9B7272BED1B55E703B1A461EE71CD6869BA5D
                          Malicious:true
                          Yara Hits:
                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                          Reputation:low
                          Preview:....[.2.0.2.4./.1.0./.0.4. .0.5.:.3.4.:.1.2. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):6.592135693740761
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.96%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe
                          File size:480'768 bytes
                          MD5:af9d6cdc4ff098c170ad543c236e6e0a
                          SHA1:eb3dd66a5e96512f94fd29b07d2ac277d66b30b6
                          SHA256:372cbc51a06856ab5865659790ec01821c095afda53e177256eebe1ae4af5b6a
                          SHA512:3e7eb91299ed161c395a750783e91237eaf53e070b224ecf9bab120720b1a093c38faf3507cfd908c0e88ab59c5af03b248bfc8856de8a68f290ded5880eb4c8
                          SSDEEP:12288:umnk7iLJbpIpiRL6I2WhSKQ9ZsfZQSAn9:WiLJbpI7I2WhQqZ7A9
                          TLSH:49A4AE02BAD2C072D57121344D2AE775DABDBC212835997BB3E61D5BFD30180A73A7B2
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......B..!...r...r...r.S r...r.S"r...r.S#r...r..Ur...r.o.r...r...s...r...s<..r...s$..r..Br...r...r*..r...sg..r...r...r...s...rRich...
                          Icon Hash:95694d05214c1b33
                          Entrypoint:0x4327a4
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                          DLL Characteristics:TERMINAL_SERVER_AWARE
                          Time Stamp:0x63011007 [Sat Aug 20 16:47:03 2022 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:5
                          OS Version Minor:1
                          File Version Major:5
                          File Version Minor:1
                          Subsystem Version Major:5
                          Subsystem Version Minor:1
                          Import Hash:5d354883fe6f15fcf48045037a99fb7a
                          Instruction
                          call 00007FB179383957h
                          jmp 00007FB1793833A3h
                          push ebp
                          mov ebp, esp
                          sub esp, 00000324h
                          push ebx
                          push esi
                          push 00000017h
                          call 00007FB1793A502Fh
                          test eax, eax
                          je 00007FB179383517h
                          mov ecx, dword ptr [ebp+08h]
                          int 29h
                          xor esi, esi
                          lea eax, dword ptr [ebp-00000324h]
                          push 000002CCh
                          push esi
                          push eax
                          mov dword ptr [0046ED04h], esi
                          call 00007FB179385962h
                          add esp, 0Ch
                          mov dword ptr [ebp-00000274h], eax
                          mov dword ptr [ebp-00000278h], ecx
                          mov dword ptr [ebp-0000027Ch], edx
                          mov dword ptr [ebp-00000280h], ebx
                          mov dword ptr [ebp-00000284h], esi
                          mov dword ptr [ebp-00000288h], edi
                          mov word ptr [ebp-0000025Ch], ss
                          mov word ptr [ebp-00000268h], cs
                          mov word ptr [ebp-0000028Ch], ds
                          mov word ptr [ebp-00000290h], es
                          mov word ptr [ebp-00000294h], fs
                          mov word ptr [ebp-00000298h], gs
                          pushfd
                          pop dword ptr [ebp-00000264h]
                          mov eax, dword ptr [ebp+04h]
                          mov dword ptr [ebp-0000026Ch], eax
                          lea eax, dword ptr [ebp+04h]
                          mov dword ptr [ebp-00000260h], eax
                          mov dword ptr [ebp-00000324h], 00010001h
                          mov eax, dword ptr [eax-04h]
                          push 00000050h
                          mov dword ptr [ebp-00000270h], eax
                          lea eax, dword ptr [ebp-58h]
                          push esi
                          push eax
                          call 00007FB1793858D9h
                          Programming Language:
                          • [C++] VS2008 SP1 build 30729
                          • [IMP] VS2008 SP1 build 30729
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x6ba580xf0.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x760000x4aa0.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x7b0000x39ac.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x69f100x38.rdata
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x69fa40x18.rdata
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x69f480x40.rdata
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x560000x4ac.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x5434b0x54400d720cbda6f644b704b35ac907cc56d49False0.574827290430267data6.624462527244835IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x560000x173920x174007f74ade58c43b15ee0754893e037c956False0.5001050067204301data5.8556949326481496IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0x6e0000x5c2c0xe00121423e4a98fa367c6f6bf7e0478d052False0.21986607142857142data2.967957166860955IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .tls0x740000x90x2001f354d76203061bfdd5a53dae48d5435False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .gfids0x750000x2300x400c42969612e5c912b6c5d217fb5c3eeb3False0.3203125data2.368295399421673IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .rsrc0x760000x4aa00x4c00f75f617499f887b3e7eb64e5a34ec910False0.27446546052631576data3.9789338540146306IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0x7b0000x39ac0x3a00fdc450eb9b0c8ffc8324fb61b541b328False0.7665005387931034data6.71659520483491IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_ICON0x7618c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.3421985815602837
                          RT_ICON0x765f40x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.27704918032786885
                          RT_ICON0x76f7c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.23686679174484052
                          RT_ICON0x780240x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.22977178423236513
                          RT_RCDATA0x7a5cc0x493data1.0093936806148591
                          RT_GROUP_ICON0x7aa600x3edataEnglishUnited States0.8064516129032258
                          DLLImport
                          KERNEL32.dllCopyFileW, CreateMutexA, GetLocaleInfoA, CreateToolhelp32Snapshot, OpenMutexA, Process32NextW, Process32FirstW, VirtualProtect, SetLastError, VirtualFree, VirtualAlloc, GetNativeSystemInfo, HeapAlloc, GetProcessHeap, FreeLibrary, IsBadReadPtr, GetTempPathW, OpenProcess, lstrcatW, GetCurrentProcessId, GetTempFileNameW, GetCurrentProcess, GetSystemDirectoryA, GlobalAlloc, GlobalLock, GetTickCount, GlobalUnlock, WriteProcessMemory, ResumeThread, GetThreadContext, ReadProcessMemory, CreateProcessW, SetThreadContext, LocalAlloc, GlobalFree, MulDiv, SizeofResource, SetFilePointer, FindResourceA, LockResource, LoadResource, LocalFree, FormatMessageA, AllocConsole, GetModuleFileNameA, lstrcpynA, QueryPerformanceFrequency, GetLongPathNameW, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSection, DeleteCriticalSection, HeapSize, WriteConsoleW, SetStdHandle, SetEnvironmentVariableW, SetEnvironmentVariableA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetOEMCP, IsValidCodePage, FindFirstFileExA, ReadConsoleW, GetConsoleMode, GetConsoleCP, FlushFileBuffers, GetFileType, GetTimeZoneInformation, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetTimeFormatW, GetDateFormatW, HeapReAlloc, GetACP, GetStdHandle, GetModuleHandleExW, MoveFileExW, RtlUnwind, RaiseException, LoadLibraryExW, GetCPInfo, GetStringTypeW, GetLocaleInfoW, LCMapStringW, CompareStringW, TlsFree, TlsSetValue, ExpandEnvironmentStringsA, FindNextFileA, FindFirstFileA, GetFileSize, TerminateThread, GetLastError, SetFileAttributesW, GetModuleHandleA, RemoveDirectoryW, MoveFileW, CreateDirectoryW, SetFilePointerEx, GetLogicalDriveStringsA, DeleteFileW, DeleteFileA, GetFileAttributesW, FindClose, lstrlenA, GetDriveTypeA, FindNextFileW, GetFileSizeEx, FindFirstFileW, ExitProcess, GetProcAddress, LoadLibraryA, CreateProcessA, PeekNamedPipe, CreatePipe, TerminateProcess, ReadFile, HeapFree, HeapCreate, CreateEventA, GetLocalTime, CreateThread, SetEvent, CreateEventW, WaitForSingleObject, Sleep, GetModuleFileNameW, CloseHandle, ExitThread, CreateFileW, WriteFile, QueryPerformanceCounter, TlsGetValue, TlsAlloc, InitializeCriticalSectionAndSpinCount, MultiByteToWideChar, DecodePointer, EncodePointer, WideCharToMultiByte, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, IsProcessorFeaturePresent, GetStartupInfoW, SetUnhandledExceptionFilter, UnhandledExceptionFilter, IsDebuggerPresent, GetModuleHandleW, WaitForSingleObjectEx, ResetEvent, SetEndOfFile
                          USER32.dllCallNextHookEx, GetKeyboardLayoutNameA, GetKeyState, GetWindowTextLengthW, GetWindowThreadProcessId, SetForegroundWindow, SetClipboardData, EnumWindows, ExitWindowsEx, TranslateMessage, DispatchMessageA, GetMessageA, GetWindowTextW, wsprintfW, GetClipboardData, UnhookWindowsHookEx, GetForegroundWindow, ToUnicodeEx, GetKeyboardLayout, SetWindowsHookExA, CloseClipboard, OpenClipboard, GetKeyboardState, DrawIcon, GetSystemMetrics, GetIconInfo, SystemParametersInfoW, GetCursorPos, RegisterClassExA, AppendMenuA, mouse_event, CreateWindowExA, DefWindowProcA, TrackPopupMenu, CreatePopupMenu, EnumDisplaySettingsW, SendInput, CloseWindow, EmptyClipboard, ShowWindow, SetWindowTextW, MessageBoxW, IsWindowVisible
                          GDI32.dllCreateCompatibleBitmap, SelectObject, CreateCompatibleDC, StretchBlt, GetDIBits, DeleteDC, DeleteObject, CreateDCA, GetObjectA
                          ADVAPI32.dllCryptAcquireContextA, CryptGenRandom, CryptReleaseContext, GetUserNameW, RegEnumKeyExA, QueryServiceStatus, CloseServiceHandle, OpenSCManagerW, OpenSCManagerA, ControlService, StartServiceW, QueryServiceConfigW, ChangeServiceConfigW, OpenServiceW, EnumServicesStatusW, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, RegCreateKeyA, RegCloseKey, RegQueryInfoKeyW, RegQueryValueExA, RegCreateKeyExW, RegEnumKeyExW, RegSetValueExW, RegSetValueExA, RegOpenKeyExA, RegOpenKeyExW, RegCreateKeyW, RegDeleteValueW, RegEnumValueW, RegQueryValueExW, RegDeleteKeyA
                          SHELL32.dllShellExecuteExA, Shell_NotifyIconA, ExtractIconA, ShellExecuteW
                          SHLWAPI.dllStrToIntA, PathFileExistsW, PathFileExistsA
                          WINMM.dllwaveInPrepareHeader, waveInStop, waveInUnprepareHeader, mciSendStringA, PlaySoundW, waveInOpen, waveInStart, waveInAddBuffer, waveInClose, mciSendStringW
                          WS2_32.dllWSAGetLastError, recv, connect, socket, send, WSAStartup, closesocket, inet_ntoa, gethostbyname, WSASetLastError, inet_addr, gethostbyaddr, getservbyport, ntohs, getservbyname, htons, htonl
                          urlmon.dllURLDownloadToFileW, URLOpenBlockingStreamW
                          gdiplus.dllGdiplusStartup, GdipGetImageEncoders, GdipCloneImage, GdipAlloc, GdipDisposeImage, GdipFree, GdipGetImageEncodersSize, GdipSaveImageToStream, GdipLoadImageFromStream
                          WININET.dllInternetOpenUrlW, InternetCloseHandle, InternetReadFile, InternetOpenW
                          Language of compilation systemCountry where language is spokenMap
                          EnglishUnited States
                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                          2024-10-04T11:34:34.955076+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.94972564.188.16.15731944TCP
                          2024-10-04T11:34:57.329750+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.94985064.188.16.15731944TCP
                          2024-10-04T11:35:19.752659+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.94997464.188.16.15731944TCP
                          2024-10-04T11:35:42.128299+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.94997664.188.16.15731944TCP
                          2024-10-04T11:36:04.519512+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.94997764.188.16.15731944TCP
                          2024-10-04T11:36:26.913999+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.94997864.188.16.15731944TCP
                          2024-10-04T11:36:49.334368+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.94997964.188.16.15731944TCP
                          2024-10-04T11:37:11.721647+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.94998064.188.16.15731944TCP
                          2024-10-04T11:37:34.116208+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.94998164.188.16.15731944TCP
                          2024-10-04T11:37:56.538639+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.94998264.188.16.15731944TCP
                          2024-10-04T11:38:18.925581+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.94998364.188.16.15731944TCP
                          TimestampSource PortDest PortSource IPDest IP
                          Oct 4, 2024 11:34:13.576520920 CEST4972531944192.168.2.964.188.16.157
                          Oct 4, 2024 11:34:13.585402012 CEST319444972564.188.16.157192.168.2.9
                          Oct 4, 2024 11:34:13.585572004 CEST4972531944192.168.2.964.188.16.157
                          Oct 4, 2024 11:34:13.591979027 CEST4972531944192.168.2.964.188.16.157
                          Oct 4, 2024 11:34:13.597567081 CEST319444972564.188.16.157192.168.2.9
                          Oct 4, 2024 11:34:34.954803944 CEST319444972564.188.16.157192.168.2.9
                          Oct 4, 2024 11:34:34.955075979 CEST4972531944192.168.2.964.188.16.157
                          Oct 4, 2024 11:34:34.955369949 CEST4972531944192.168.2.964.188.16.157
                          Oct 4, 2024 11:34:34.960145950 CEST319444972564.188.16.157192.168.2.9
                          Oct 4, 2024 11:34:35.961461067 CEST4985031944192.168.2.964.188.16.157
                          Oct 4, 2024 11:34:35.966356993 CEST319444985064.188.16.157192.168.2.9
                          Oct 4, 2024 11:34:35.966483116 CEST4985031944192.168.2.964.188.16.157
                          Oct 4, 2024 11:34:35.970144987 CEST4985031944192.168.2.964.188.16.157
                          Oct 4, 2024 11:34:35.974962950 CEST319444985064.188.16.157192.168.2.9
                          Oct 4, 2024 11:34:57.329591036 CEST319444985064.188.16.157192.168.2.9
                          Oct 4, 2024 11:34:57.329750061 CEST4985031944192.168.2.964.188.16.157
                          Oct 4, 2024 11:34:57.329849005 CEST4985031944192.168.2.964.188.16.157
                          Oct 4, 2024 11:34:57.338737011 CEST319444985064.188.16.157192.168.2.9
                          Oct 4, 2024 11:34:58.339873075 CEST4997431944192.168.2.964.188.16.157
                          Oct 4, 2024 11:34:58.344854116 CEST319444997464.188.16.157192.168.2.9
                          Oct 4, 2024 11:34:58.345210075 CEST4997431944192.168.2.964.188.16.157
                          Oct 4, 2024 11:34:58.349040985 CEST4997431944192.168.2.964.188.16.157
                          Oct 4, 2024 11:34:58.353943110 CEST319444997464.188.16.157192.168.2.9
                          Oct 4, 2024 11:35:19.751476049 CEST319444997464.188.16.157192.168.2.9
                          Oct 4, 2024 11:35:19.752659082 CEST4997431944192.168.2.964.188.16.157
                          Oct 4, 2024 11:35:19.752837896 CEST4997431944192.168.2.964.188.16.157
                          Oct 4, 2024 11:35:19.757783890 CEST319444997464.188.16.157192.168.2.9
                          Oct 4, 2024 11:35:20.768142939 CEST4997631944192.168.2.964.188.16.157
                          Oct 4, 2024 11:35:20.772991896 CEST319444997664.188.16.157192.168.2.9
                          Oct 4, 2024 11:35:20.773082018 CEST4997631944192.168.2.964.188.16.157
                          Oct 4, 2024 11:35:20.776859999 CEST4997631944192.168.2.964.188.16.157
                          Oct 4, 2024 11:35:20.781704903 CEST319444997664.188.16.157192.168.2.9
                          Oct 4, 2024 11:35:42.128218889 CEST319444997664.188.16.157192.168.2.9
                          Oct 4, 2024 11:35:42.128298998 CEST4997631944192.168.2.964.188.16.157
                          Oct 4, 2024 11:35:42.128400087 CEST4997631944192.168.2.964.188.16.157
                          Oct 4, 2024 11:35:42.133214951 CEST319444997664.188.16.157192.168.2.9
                          Oct 4, 2024 11:35:43.133106947 CEST4997731944192.168.2.964.188.16.157
                          Oct 4, 2024 11:35:43.137944937 CEST319444997764.188.16.157192.168.2.9
                          Oct 4, 2024 11:35:43.138031006 CEST4997731944192.168.2.964.188.16.157
                          Oct 4, 2024 11:35:43.141551971 CEST4997731944192.168.2.964.188.16.157
                          Oct 4, 2024 11:35:43.146404028 CEST319444997764.188.16.157192.168.2.9
                          Oct 4, 2024 11:36:04.519359112 CEST319444997764.188.16.157192.168.2.9
                          Oct 4, 2024 11:36:04.519511938 CEST4997731944192.168.2.964.188.16.157
                          Oct 4, 2024 11:36:04.519933939 CEST4997731944192.168.2.964.188.16.157
                          Oct 4, 2024 11:36:04.524970055 CEST319444997764.188.16.157192.168.2.9
                          Oct 4, 2024 11:36:05.523427963 CEST4997831944192.168.2.964.188.16.157
                          Oct 4, 2024 11:36:05.528301001 CEST319444997864.188.16.157192.168.2.9
                          Oct 4, 2024 11:36:05.528369904 CEST4997831944192.168.2.964.188.16.157
                          Oct 4, 2024 11:36:05.531898975 CEST4997831944192.168.2.964.188.16.157
                          Oct 4, 2024 11:36:05.536722898 CEST319444997864.188.16.157192.168.2.9
                          Oct 4, 2024 11:36:26.912174940 CEST319444997864.188.16.157192.168.2.9
                          Oct 4, 2024 11:36:26.913999081 CEST4997831944192.168.2.964.188.16.157
                          Oct 4, 2024 11:36:26.914086103 CEST4997831944192.168.2.964.188.16.157
                          Oct 4, 2024 11:36:26.918968916 CEST319444997864.188.16.157192.168.2.9
                          Oct 4, 2024 11:36:27.941159010 CEST4997931944192.168.2.964.188.16.157
                          Oct 4, 2024 11:36:27.946242094 CEST319444997964.188.16.157192.168.2.9
                          Oct 4, 2024 11:36:27.948580980 CEST4997931944192.168.2.964.188.16.157
                          Oct 4, 2024 11:36:27.952095032 CEST4997931944192.168.2.964.188.16.157
                          Oct 4, 2024 11:36:27.960475922 CEST319444997964.188.16.157192.168.2.9
                          Oct 4, 2024 11:36:49.334278107 CEST319444997964.188.16.157192.168.2.9
                          Oct 4, 2024 11:36:49.334367990 CEST4997931944192.168.2.964.188.16.157
                          Oct 4, 2024 11:36:49.334441900 CEST4997931944192.168.2.964.188.16.157
                          Oct 4, 2024 11:36:49.339298964 CEST319444997964.188.16.157192.168.2.9
                          Oct 4, 2024 11:36:50.351418972 CEST4998031944192.168.2.964.188.16.157
                          Oct 4, 2024 11:36:50.356565952 CEST319444998064.188.16.157192.168.2.9
                          Oct 4, 2024 11:36:50.356694937 CEST4998031944192.168.2.964.188.16.157
                          Oct 4, 2024 11:36:50.361206055 CEST4998031944192.168.2.964.188.16.157
                          Oct 4, 2024 11:36:50.366157055 CEST319444998064.188.16.157192.168.2.9
                          Oct 4, 2024 11:37:11.721450090 CEST319444998064.188.16.157192.168.2.9
                          Oct 4, 2024 11:37:11.721647024 CEST4998031944192.168.2.964.188.16.157
                          Oct 4, 2024 11:37:11.721647024 CEST4998031944192.168.2.964.188.16.157
                          Oct 4, 2024 11:37:11.726479053 CEST319444998064.188.16.157192.168.2.9
                          Oct 4, 2024 11:37:12.726380110 CEST4998131944192.168.2.964.188.16.157
                          Oct 4, 2024 11:37:12.731331110 CEST319444998164.188.16.157192.168.2.9
                          Oct 4, 2024 11:37:12.731437922 CEST4998131944192.168.2.964.188.16.157
                          Oct 4, 2024 11:37:12.735244989 CEST4998131944192.168.2.964.188.16.157
                          Oct 4, 2024 11:37:12.740164995 CEST319444998164.188.16.157192.168.2.9
                          Oct 4, 2024 11:37:34.116086006 CEST319444998164.188.16.157192.168.2.9
                          Oct 4, 2024 11:37:34.116208076 CEST4998131944192.168.2.964.188.16.157
                          Oct 4, 2024 11:37:34.116256952 CEST4998131944192.168.2.964.188.16.157
                          Oct 4, 2024 11:37:34.121525049 CEST319444998164.188.16.157192.168.2.9
                          Oct 4, 2024 11:37:35.144320011 CEST4998231944192.168.2.964.188.16.157
                          Oct 4, 2024 11:37:35.149554968 CEST319444998264.188.16.157192.168.2.9
                          Oct 4, 2024 11:37:35.149620056 CEST4998231944192.168.2.964.188.16.157
                          Oct 4, 2024 11:37:35.153728008 CEST4998231944192.168.2.964.188.16.157
                          Oct 4, 2024 11:37:35.158518076 CEST319444998264.188.16.157192.168.2.9
                          Oct 4, 2024 11:37:56.538530111 CEST319444998264.188.16.157192.168.2.9
                          Oct 4, 2024 11:37:56.538639069 CEST4998231944192.168.2.964.188.16.157
                          Oct 4, 2024 11:37:56.538731098 CEST4998231944192.168.2.964.188.16.157
                          Oct 4, 2024 11:37:56.545205116 CEST319444998264.188.16.157192.168.2.9
                          Oct 4, 2024 11:37:57.554956913 CEST4998331944192.168.2.964.188.16.157
                          Oct 4, 2024 11:37:57.559789896 CEST319444998364.188.16.157192.168.2.9
                          Oct 4, 2024 11:37:57.561661959 CEST4998331944192.168.2.964.188.16.157
                          Oct 4, 2024 11:37:57.565210104 CEST4998331944192.168.2.964.188.16.157
                          Oct 4, 2024 11:37:57.569994926 CEST319444998364.188.16.157192.168.2.9
                          Oct 4, 2024 11:38:18.925193071 CEST319444998364.188.16.157192.168.2.9
                          Oct 4, 2024 11:38:18.925580978 CEST4998331944192.168.2.964.188.16.157
                          Oct 4, 2024 11:38:18.925580978 CEST4998331944192.168.2.964.188.16.157
                          Oct 4, 2024 11:38:18.931179047 CEST319444998364.188.16.157192.168.2.9
                          TimestampSource PortDest PortSource IPDest IP
                          Oct 4, 2024 11:34:13.547236919 CEST6530453192.168.2.91.1.1.1
                          Oct 4, 2024 11:34:13.562170982 CEST53653041.1.1.1192.168.2.9
                          Oct 4, 2024 11:35:20.757446051 CEST5092153192.168.2.91.1.1.1
                          Oct 4, 2024 11:35:20.766815901 CEST53509211.1.1.1192.168.2.9
                          Oct 4, 2024 11:36:27.928771973 CEST5491153192.168.2.91.1.1.1
                          Oct 4, 2024 11:36:27.937359095 CEST53549111.1.1.1192.168.2.9
                          Oct 4, 2024 11:37:35.131860018 CEST5867553192.168.2.91.1.1.1
                          Oct 4, 2024 11:37:35.143044949 CEST53586751.1.1.1192.168.2.9
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Oct 4, 2024 11:34:13.547236919 CEST192.168.2.91.1.1.10xa965Standard query (0)ab9001.ddns.netA (IP address)IN (0x0001)false
                          Oct 4, 2024 11:35:20.757446051 CEST192.168.2.91.1.1.10x8c1bStandard query (0)ab9001.ddns.netA (IP address)IN (0x0001)false
                          Oct 4, 2024 11:36:27.928771973 CEST192.168.2.91.1.1.10xbff5Standard query (0)ab9001.ddns.netA (IP address)IN (0x0001)false
                          Oct 4, 2024 11:37:35.131860018 CEST192.168.2.91.1.1.10xbdf0Standard query (0)ab9001.ddns.netA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Oct 4, 2024 11:34:09.521409988 CEST1.1.1.1192.168.2.90x692aNo error (0)shed.dual-low.s-part-0032.t-0009.t-msedge.nets-part-0032.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                          Oct 4, 2024 11:34:09.521409988 CEST1.1.1.1192.168.2.90x692aNo error (0)s-part-0032.t-0009.t-msedge.net13.107.246.60A (IP address)IN (0x0001)false
                          Oct 4, 2024 11:34:13.562170982 CEST1.1.1.1192.168.2.90xa965No error (0)ab9001.ddns.net64.188.16.157A (IP address)IN (0x0001)false
                          Oct 4, 2024 11:35:20.766815901 CEST1.1.1.1192.168.2.90x8c1bNo error (0)ab9001.ddns.net64.188.16.157A (IP address)IN (0x0001)false
                          Oct 4, 2024 11:36:27.937359095 CEST1.1.1.1192.168.2.90xbff5No error (0)ab9001.ddns.net64.188.16.157A (IP address)IN (0x0001)false
                          Oct 4, 2024 11:37:35.143044949 CEST1.1.1.1192.168.2.90xbdf0No error (0)ab9001.ddns.net64.188.16.157A (IP address)IN (0x0001)false

                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Target ID:0
                          Start time:05:34:12
                          Start date:04/10/2024
                          Path:C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe"
                          Imagebase:0x400000
                          File size:480'768 bytes
                          MD5 hash:AF9D6CDC4FF098C170AD543C236E6E0A
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.3790231384.000000000227F000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000000.1345113615.0000000000456000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                          • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                          • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000000.1345113615.0000000000456000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.3789994357.00000000004AE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low
                          Has exited:false

                          Reset < >

                            Execution Graph

                            Execution Coverage:3%
                            Dynamic/Decrypted Code Coverage:0%
                            Signature Coverage:23.7%
                            Total number of Nodes:1120
                            Total number of Limit Nodes:43
                            execution_graph 45372 42d6a2 45373 42d6ad 45372->45373 45374 42d6c1 45373->45374 45376 430ca3 45373->45376 45377 430cb2 45376->45377 45378 430cae 45376->45378 45380 43b6c1 45377->45380 45378->45374 45381 443697 45380->45381 45382 4436a4 45381->45382 45383 4436af 45381->45383 45393 443649 21 API calls 3 library calls 45382->45393 45385 4436b7 45383->45385 45391 4436c0 ___crtLCMapStringA 45383->45391 45394 443c92 20 API calls __dosmaperr 45385->45394 45386 4436c5 45395 43ad91 20 API calls _Atexit 45386->45395 45387 4436ea RtlReAllocateHeap 45390 4436ac 45387->45390 45387->45391 45390->45378 45391->45386 45391->45387 45396 440480 7 API calls 2 library calls 45391->45396 45393->45390 45394->45390 45395->45390 45396->45391 45397 424a00 45402 424a7d send 45397->45402 45403 41bd72 45404 41bd87 ctype ___scrt_get_show_window_mode 45403->45404 45405 41bf8a 45404->45405 45422 430c79 21 API calls ___std_exception_copy 45404->45422 45411 41bf3e 45405->45411 45417 41b917 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_get_show_window_mode 45405->45417 45408 41bf9b 45408->45411 45418 430c79 21 API calls ___std_exception_copy 45408->45418 45410 41bf37 ___scrt_get_show_window_mode 45410->45411 45423 430c79 21 API calls ___std_exception_copy 45410->45423 45413 41bfd4 ___scrt_get_show_window_mode 45413->45411 45419 4312ff 45413->45419 45415 41bf64 ___scrt_get_show_window_mode 45415->45411 45424 430c79 21 API calls ___std_exception_copy 45415->45424 45417->45408 45418->45413 45425 43121e 45419->45425 45421 431307 45421->45411 45422->45410 45423->45415 45424->45405 45426 431237 45425->45426 45429 43122d 45425->45429 45426->45429 45431 430c79 21 API calls ___std_exception_copy 45426->45431 45428 431258 45428->45429 45432 4315ec CryptAcquireContextA 45428->45432 45429->45421 45431->45428 45433 431608 45432->45433 45434 43160d CryptGenRandom 45432->45434 45433->45429 45434->45433 45435 431622 CryptReleaseContext 45434->45435 45435->45433 45436 424991 45442 424a66 recv 45436->45442 45443 439be8 45446 439bf4 _swprintf CallCatchBlock 45443->45446 45444 439c02 45459 43ad91 20 API calls _Atexit 45444->45459 45446->45444 45447 439c2c 45446->45447 45454 442d9a EnterCriticalSection 45447->45454 45449 439c37 45455 439cd8 45449->45455 45450 439c07 _strftime CallCatchBlock 45454->45449 45457 439ce6 45455->45457 45456 439c42 45460 439c5f LeaveCriticalSection std::_Lockit::~_Lockit 45456->45460 45457->45456 45461 446c9b 36 API calls 2 library calls 45457->45461 45459->45450 45460->45450 45461->45457 45462 40163e 45463 401646 45462->45463 45464 401649 45462->45464 45465 401688 45464->45465 45467 401676 45464->45467 45470 43229f 45465->45470 45469 43229f new 22 API calls 45467->45469 45468 40167c 45469->45468 45474 4322a4 45470->45474 45472 4322d0 45472->45468 45474->45472 45477 439adb 45474->45477 45484 440480 7 API calls 2 library calls 45474->45484 45485 4329bd RaiseException Concurrency::cancel_current_task __CxxThrowException@8 45474->45485 45486 43301b RaiseException Concurrency::cancel_current_task __CxxThrowException@8 45474->45486 45482 443649 ___crtLCMapStringA 45477->45482 45478 443687 45488 43ad91 20 API calls _Atexit 45478->45488 45479 443672 RtlAllocateHeap 45481 443685 45479->45481 45479->45482 45481->45474 45482->45478 45482->45479 45487 440480 7 API calls 2 library calls 45482->45487 45484->45474 45487->45482 45488->45481 45489 43263c 45490 432648 CallCatchBlock 45489->45490 45516 43234b 45490->45516 45492 43264f 45494 432678 45492->45494 45786 4327ae IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 45492->45786 45500 4326b7 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 45494->45500 45787 441763 5 API calls CatchGuardHandler 45494->45787 45496 432691 45498 432697 CallCatchBlock 45496->45498 45788 441707 5 API calls CatchGuardHandler 45496->45788 45505 432717 45500->45505 45789 4408e7 35 API calls 6 library calls 45500->45789 45527 4328c9 45505->45527 45517 432354 45516->45517 45794 4329da IsProcessorFeaturePresent 45517->45794 45519 432360 45795 436cd1 10 API calls 4 library calls 45519->45795 45521 432365 45526 432369 45521->45526 45796 4415bf IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 45521->45796 45523 432380 45523->45492 45524 432372 45524->45523 45797 436cfa 8 API calls 3 library calls 45524->45797 45526->45492 45798 434c30 45527->45798 45530 43271d 45531 4416b4 45530->45531 45800 44c239 45531->45800 45533 432726 45536 40d3f0 45533->45536 45534 4416bd 45534->45533 45804 443d25 35 API calls 45534->45804 45806 41a8da LoadLibraryA GetProcAddress 45536->45806 45538 40d40c 45813 40dd83 45538->45813 45540 40d415 45828 4020d6 45540->45828 45543 4020d6 28 API calls 45544 40d433 45543->45544 45834 419d87 45544->45834 45548 40d445 45860 401e6d 45548->45860 45550 40d44e 45551 40d461 45550->45551 45552 40d4b8 45550->45552 46113 40e609 116 API calls 45551->46113 45866 401e45 45552->45866 45555 40d4c6 45559 401e45 22 API calls 45555->45559 45556 40d473 45557 401e45 22 API calls 45556->45557 45558 40d47f 45557->45558 46114 40f98d 36 API calls __EH_prolog 45558->46114 45560 40d4e5 45559->45560 45871 4052fe 45560->45871 45563 40d4f4 45876 408209 45563->45876 45564 40d491 46115 40e5ba 77 API calls 45564->46115 45568 40d49a 46116 40dd70 70 API calls 45568->46116 45577 401fb8 11 API calls 45578 40d520 45577->45578 45579 401e45 22 API calls 45578->45579 45580 40d529 45579->45580 45893 401fa0 45580->45893 45582 40d534 45583 401e45 22 API calls 45582->45583 45584 40d54f 45583->45584 45585 401e45 22 API calls 45584->45585 45586 40d569 45585->45586 45587 40d5cf 45586->45587 46117 40822a 45586->46117 45588 401e45 22 API calls 45587->45588 45594 40d5dc 45588->45594 45590 40d594 45591 401fc2 28 API calls 45590->45591 45592 40d5a0 45591->45592 45595 401fb8 11 API calls 45592->45595 45593 40d650 45599 40d660 CreateMutexA GetLastError 45593->45599 45594->45593 45597 401e45 22 API calls 45594->45597 45596 40d5a9 45595->45596 46122 411f34 RegOpenKeyExA 45596->46122 45598 40d5f5 45597->45598 45604 40d5fc OpenMutexA 45598->45604 45600 40d991 45599->45600 45601 40d67f GetModuleFileNameW 45599->45601 45602 401fb8 11 API calls 45600->45602 45897 4192ae 45601->45897 45630 40d99a ___scrt_get_show_window_mode 45602->45630 45608 40d622 45604->45608 45609 40d60f WaitForSingleObject CloseHandle 45604->45609 45612 411f34 3 API calls 45608->45612 45609->45608 45610 40d6a0 45613 40d6f5 45610->45613 45614 401e45 22 API calls 45610->45614 45611 40dd0f 46195 41239a 30 API calls 45611->46195 45620 40d63b 45612->45620 45616 401e45 22 API calls 45613->45616 45625 40d6bf 45614->45625 45618 40d720 45616->45618 45617 40dd22 46196 410eda 65 API calls ___scrt_get_show_window_mode 45617->46196 45622 40d731 45618->45622 45623 40d72c 45618->45623 45620->45593 46125 41239a 30 API calls 45620->46125 45621 40dcfa 45628 402073 28 API calls 45621->45628 45652 40dd6a 45621->45652 45627 401e45 22 API calls 45622->45627 46129 40e501 CreateProcessA CloseHandle CloseHandle ___scrt_get_show_window_mode 45623->46129 45625->45613 45631 40d6f7 45625->45631 45635 40d6db 45625->45635 45637 40d73a 45627->45637 45629 40dd3a 45628->45629 46024 4052dd 45629->46024 46191 4120e8 RegOpenKeyExA RegQueryValueExA RegCloseKey 45630->46191 46127 411eea RegOpenKeyExA RegQueryValueExA RegCloseKey 45631->46127 45634 40dd4a 45636 402073 28 API calls 45634->45636 45635->45613 46126 4067a0 36 API calls ___scrt_get_show_window_mode 45635->46126 45640 40dd59 45636->45640 45644 401e45 22 API calls 45637->45644 45643 4194da 79 API calls 45640->45643 45641 40d70d 45641->45613 45645 40d712 45641->45645 45642 40d9ec 45646 401e45 22 API calls 45642->45646 45647 40dd5e 45643->45647 45648 40d755 45644->45648 46128 4066a6 59 API calls 45645->46128 45650 40da10 45646->45650 45651 401fb8 11 API calls 45647->45651 45654 401e45 22 API calls 45648->45654 45924 402073 45650->45924 45651->45652 46026 413980 45652->46026 45657 40d76f 45654->45657 45656 40dd6f 45659 401e45 22 API calls 45657->45659 45658 40da22 45930 41215f RegCreateKeyA 45658->45930 45660 40d789 45659->45660 45664 401e45 22 API calls 45660->45664 45663 401e45 22 API calls 45665 40da44 45663->45665 45669 40d7a3 45664->45669 45936 439867 45665->45936 45668 40d810 45668->45630 45672 40d828 45668->45672 45709 40d8a7 ___scrt_get_show_window_mode 45668->45709 45669->45668 45671 401e45 22 API calls 45669->45671 45670 40da61 46192 41aa4f 82 API calls ___scrt_get_show_window_mode 45670->46192 45681 40d7b8 _wcslen 45671->45681 45674 401e45 22 API calls 45672->45674 45673 40da7e 45676 402073 28 API calls 45673->45676 45677 40d831 45674->45677 45679 40da8d 45676->45679 45683 401e45 22 API calls 45677->45683 45678 40da70 CreateThread 45678->45673 46851 41b212 10 API calls 45678->46851 45680 402073 28 API calls 45679->45680 45682 40da9c 45680->45682 45681->45668 45685 401e45 22 API calls 45681->45685 45940 4194da 45682->45940 45686 40d843 45683->45686 45689 40d7d3 45685->45689 45691 401e45 22 API calls 45686->45691 45688 401e45 22 API calls 45690 40daad 45688->45690 45692 401e45 22 API calls 45689->45692 45694 401e45 22 API calls 45690->45694 45693 40d855 45691->45693 45695 40d7e8 45692->45695 45697 401e45 22 API calls 45693->45697 45696 40dabf 45694->45696 46130 40c5ed 45695->46130 45700 401e45 22 API calls 45696->45700 45698 40d87e 45697->45698 45704 401e45 22 API calls 45698->45704 45702 40dad5 45700->45702 45708 401e45 22 API calls 45702->45708 45703 401ef3 28 API calls 45705 40d807 45703->45705 45706 40d88f 45704->45706 45707 401ee9 11 API calls 45705->45707 46188 40b871 47 API calls _wcslen 45706->46188 45707->45668 45710 40daf5 45708->45710 45914 412338 45709->45914 45715 439867 _strftime 39 API calls 45710->45715 45713 40d942 ctype 45718 401e45 22 API calls 45713->45718 45714 40d89f 45714->45709 45716 40db02 45715->45716 45717 401e45 22 API calls 45716->45717 45719 40db0d 45717->45719 45720 40d959 45718->45720 45721 401e45 22 API calls 45719->45721 45720->45642 45722 40d96d 45720->45722 45723 40db1e 45721->45723 45724 401e45 22 API calls 45722->45724 45964 408f1f 45723->45964 45725 40d976 45724->45725 46189 419bca 28 API calls 45725->46189 45728 40d982 46190 40de34 91 API calls 45728->46190 45731 401e45 22 API calls 45733 40db3c 45731->45733 45732 40d987 45732->45600 45732->45642 45734 40db83 45733->45734 45735 40db4a 45733->45735 45737 401e45 22 API calls 45734->45737 45736 43229f new 22 API calls 45735->45736 45738 40db53 45736->45738 45739 40db91 45737->45739 45740 401e45 22 API calls 45738->45740 45742 40dbd9 45739->45742 45743 40db9c 45739->45743 45741 40db65 45740->45741 45745 40db6c CreateThread 45741->45745 45744 401e45 22 API calls 45742->45744 45746 43229f new 22 API calls 45743->45746 45747 40dbe2 45744->45747 45745->45734 46846 417f6a 108 API calls 2 library calls 45745->46846 45748 40dba5 45746->45748 45751 40dc4c 45747->45751 45752 40dbed 45747->45752 45749 401e45 22 API calls 45748->45749 45750 40dbb6 45749->45750 45753 40dbbd CreateThread 45750->45753 45754 401e45 22 API calls 45751->45754 45755 401e45 22 API calls 45752->45755 45753->45742 46850 417f6a 108 API calls 2 library calls 45753->46850 45756 40dc55 45754->45756 45757 40dbfc 45755->45757 45758 40dc60 45756->45758 45759 40dc99 45756->45759 45760 401e45 22 API calls 45757->45760 45762 401e45 22 API calls 45758->45762 46001 4195f8 GetComputerNameExW GetUserNameW 45759->46001 45763 40dc11 45760->45763 45765 40dc69 45762->45765 46193 40c5a1 32 API calls 45763->46193 45769 401e45 22 API calls 45765->45769 45772 40dc7e 45769->45772 45770 40dc24 45773 401ef3 28 API calls 45770->45773 45782 439867 _strftime 39 API calls 45772->45782 45775 40dc30 45773->45775 45780 401ee9 11 API calls 45775->45780 45776 40dcc1 SetProcessDEPPolicy 45777 40dcc4 CreateThread 45776->45777 45778 40dce5 45777->45778 45779 40dcd9 CreateThread 45777->45779 46819 40e18d 45777->46819 45778->45621 45781 40dcee CreateThread 45778->45781 45779->45778 46847 410b5c 135 API calls 45779->46847 45783 40dc39 CreateThread 45780->45783 45781->45621 46848 411140 38 API calls ___scrt_get_show_window_mode 45781->46848 45784 40dc8b 45782->45784 45783->45751 46849 401bc9 49 API calls _strftime 45783->46849 46194 40b0a3 7 API calls 45784->46194 45786->45492 45787->45496 45788->45500 45789->45505 45794->45519 45795->45521 45796->45524 45797->45526 45799 4328dc GetStartupInfoW 45798->45799 45799->45530 45801 44c242 45800->45801 45803 44c24b 45800->45803 45805 44c138 48 API calls 5 library calls 45801->45805 45803->45534 45804->45534 45805->45803 45807 41a919 LoadLibraryA GetProcAddress 45806->45807 45808 41a909 GetModuleHandleA GetProcAddress 45806->45808 45809 41a947 GetModuleHandleA GetProcAddress 45807->45809 45810 41a937 GetModuleHandleA GetProcAddress 45807->45810 45808->45807 45811 41a973 24 API calls 45809->45811 45812 41a95f GetModuleHandleA GetProcAddress 45809->45812 45810->45809 45811->45538 45812->45811 46197 419493 FindResourceA 45813->46197 45816 439adb ___std_exception_copy 21 API calls 45817 40ddad ctype 45816->45817 46200 402097 45817->46200 45820 401fc2 28 API calls 45821 40ddd3 45820->45821 45822 401fb8 11 API calls 45821->45822 45823 40dddc 45822->45823 45824 439adb ___std_exception_copy 21 API calls 45823->45824 45825 40dded ctype 45824->45825 46206 4062ee 45825->46206 45827 40de20 45827->45540 45829 4020ec 45828->45829 45830 4023ae 11 API calls 45829->45830 45831 402106 45830->45831 45832 402549 28 API calls 45831->45832 45833 402114 45832->45833 45833->45543 46241 4020bf 45834->46241 45836 419d9a 45840 419e0c 45836->45840 45848 401fc2 28 API calls 45836->45848 45851 401fb8 11 API calls 45836->45851 45855 419e0a 45836->45855 46245 404182 28 API calls 45836->46245 46246 41ab9a 45836->46246 45837 401fb8 11 API calls 45838 419e3c 45837->45838 45839 401fb8 11 API calls 45838->45839 45841 419e44 45839->45841 46257 404182 28 API calls 45840->46257 45844 401fb8 11 API calls 45841->45844 45846 40d43c 45844->45846 45845 419e18 45847 401fc2 28 API calls 45845->45847 45856 40e563 45846->45856 45849 419e21 45847->45849 45848->45836 45850 401fb8 11 API calls 45849->45850 45852 419e29 45850->45852 45851->45836 45853 41ab9a 28 API calls 45852->45853 45853->45855 45855->45837 45857 40e56f 45856->45857 45859 40e576 45856->45859 46283 402143 11 API calls 45857->46283 45859->45548 45862 402143 45860->45862 45861 40217f 45861->45550 45862->45861 46284 402710 11 API calls 45862->46284 45864 402164 46285 4026f2 11 API calls std::_Deallocate 45864->46285 45867 401e4d 45866->45867 45868 401e55 45867->45868 46286 402138 22 API calls 45867->46286 45868->45555 45872 4020bf 11 API calls 45871->45872 45873 40530a 45872->45873 46287 403280 45873->46287 45875 405326 45875->45563 46292 4051cf 45876->46292 45878 408217 46296 402035 45878->46296 45881 401fc2 45882 401fd1 45881->45882 45883 402019 45881->45883 45884 4023ae 11 API calls 45882->45884 45890 401fb8 45883->45890 45885 401fda 45884->45885 45886 40201c 45885->45886 45887 401ff5 45885->45887 45888 40265a 11 API calls 45886->45888 46330 403078 28 API calls 45887->46330 45888->45883 45891 4023ae 11 API calls 45890->45891 45892 401fc1 45891->45892 45892->45577 45894 401fb2 45893->45894 45895 401fa9 45893->45895 45894->45582 46331 4025c0 28 API calls 45895->46331 46332 419f23 45897->46332 45902 401fc2 28 API calls 45903 4192ea 45902->45903 45904 401fb8 11 API calls 45903->45904 45905 4192f2 45904->45905 45906 411f91 31 API calls 45905->45906 45908 419348 45905->45908 45907 41931b 45906->45907 45909 419326 StrToIntA 45907->45909 45908->45610 45910 41933d 45909->45910 45911 419334 45909->45911 45913 401fb8 11 API calls 45910->45913 46341 41accf 22 API calls 45911->46341 45913->45908 45915 412356 45914->45915 45916 4062ee 28 API calls 45915->45916 45917 41236b 45916->45917 45918 4020d6 28 API calls 45917->45918 45919 41237b 45918->45919 45920 41215f 14 API calls 45919->45920 45921 412385 45920->45921 45922 401fb8 11 API calls 45921->45922 45923 412392 45922->45923 45923->45713 45925 40207b 45924->45925 45926 4023ae 11 API calls 45925->45926 45927 402086 45926->45927 46342 4024cd 45927->46342 45931 4121af 45930->45931 45933 412178 45930->45933 45932 401fb8 11 API calls 45931->45932 45934 40da38 45932->45934 45935 41218a RegSetValueExA RegCloseKey 45933->45935 45934->45663 45935->45931 45937 439880 _strftime 45936->45937 46346 438bbe 45937->46346 45939 40da51 45939->45670 45939->45673 45941 4194f0 GetLocalTime 45940->45941 45942 41958b 45940->45942 45943 4052fe 28 API calls 45941->45943 45944 401fb8 11 API calls 45942->45944 45945 419532 45943->45945 45946 419593 45944->45946 45947 408209 28 API calls 45945->45947 45948 401fb8 11 API calls 45946->45948 45949 41953e 45947->45949 45950 40daa1 45948->45950 46374 402ef0 45949->46374 45950->45688 45953 408209 28 API calls 45954 419556 45953->45954 46379 41928b 76 API calls 45954->46379 45956 419564 45957 401fb8 11 API calls 45956->45957 45958 419570 45957->45958 45959 401fb8 11 API calls 45958->45959 45960 419579 45959->45960 45961 401fb8 11 API calls 45960->45961 45962 419582 45961->45962 45963 401fb8 11 API calls 45962->45963 45963->45942 46383 401f66 45964->46383 45966 408f36 _wcslen 45967 408f60 45966->45967 45968 408f49 45966->45968 45970 40c5ed 32 API calls 45967->45970 45969 40c5ed 32 API calls 45968->45969 45971 408f51 45969->45971 45972 408f68 45970->45972 45974 401ef3 28 API calls 45971->45974 45973 401ef3 28 API calls 45972->45973 45975 408f76 45973->45975 46000 408f5b 45974->46000 45976 401ee9 11 API calls 45975->45976 45977 408f7e 45976->45977 46415 4081c7 28 API calls 45977->46415 45978 401ee9 11 API calls 45980 408fb5 45978->45980 45982 408ffb 45980->45982 45983 408fdc 45980->45983 45981 408f90 46416 402ff4 45981->46416 46387 408098 45982->46387 45984 408fe1 45983->45984 45985 409013 45983->45985 45988 408098 28 API calls 45984->45988 45991 401ee9 11 API calls 45985->45991 45992 408fef 45988->45992 45995 40901b 45991->45995 46421 4092ba 29 API calls 45992->46421 45993 401ef3 28 API calls 45997 408fa5 45993->45997 45995->45731 45999 401ee9 11 API calls 45997->45999 45998 408ff9 45998->45985 45999->46000 46000->45978 46595 40415e 46001->46595 46006 402ff4 28 API calls 46007 41965d 46006->46007 46008 401ee9 11 API calls 46007->46008 46009 419666 46008->46009 46010 401ee9 11 API calls 46009->46010 46011 40dca2 46010->46011 46012 401ef3 46011->46012 46013 401f02 46012->46013 46020 401f4a 46012->46020 46014 402232 11 API calls 46013->46014 46015 401f0b 46014->46015 46016 401f4d 46015->46016 46018 401f26 46015->46018 46017 402316 11 API calls 46016->46017 46017->46020 46688 40303c 28 API calls 46018->46688 46021 401ee9 46020->46021 46022 402232 11 API calls 46021->46022 46023 401ef2 46022->46023 46023->45776 46023->45777 46689 40533f 28 API calls 46024->46689 46027 4020bf 11 API calls 46026->46027 46028 413994 46027->46028 46690 419894 46028->46690 46031 4020bf 11 API calls 46032 4139aa 46031->46032 46033 401e45 22 API calls 46032->46033 46034 4139b8 46033->46034 46035 439867 _strftime 39 API calls 46034->46035 46036 4139c5 46035->46036 46037 4139d7 46036->46037 46038 4139ca Sleep 46036->46038 46039 402073 28 API calls 46037->46039 46038->46037 46040 4139e6 46039->46040 46041 401e45 22 API calls 46040->46041 46042 4139ef 46041->46042 46043 4020d6 28 API calls 46042->46043 46044 4139fa 46043->46044 46045 419d87 28 API calls 46044->46045 46046 413a02 46045->46046 46047 401e45 22 API calls 46046->46047 46048 413a15 46047->46048 46049 401e45 22 API calls 46048->46049 46061 413a94 46048->46061 46050 413a2e 46049->46050 46053 401e45 22 API calls 46050->46053 46051 401e45 22 API calls 46051->46061 46052 4020d6 28 API calls 46052->46061 46054 413a3f 46053->46054 46056 401e45 22 API calls 46054->46056 46055 419d87 28 API calls 46055->46061 46057 413a50 46056->46057 46058 401e45 22 API calls 46057->46058 46060 413a61 46058->46060 46059 40822a 28 API calls 46059->46061 46063 401e45 22 API calls 46060->46063 46061->46051 46061->46052 46061->46055 46061->46059 46062 401fc2 28 API calls 46061->46062 46064 401fb8 11 API calls 46061->46064 46070 413be2 WSAGetLastError 46061->46070 46072 4052dd 28 API calls 46061->46072 46075 4194da 79 API calls 46061->46075 46077 4052fe 28 API calls 46061->46077 46078 401e6d 11 API calls 46061->46078 46079 439867 _strftime 39 API calls 46061->46079 46081 408209 28 API calls 46061->46081 46082 402ef0 28 API calls 46061->46082 46083 402073 28 API calls 46061->46083 46086 408098 28 API calls 46061->46086 46089 411f91 31 API calls 46061->46089 46112 413e11 46061->46112 46694 41393f 46061->46694 46699 404f31 46061->46699 46711 4048a8 46061->46711 46770 404e06 46061->46770 46782 4197c1 GlobalMemoryStatusEx 46061->46782 46783 413013 50 API calls 46061->46783 46784 43f34f 20 API calls 46061->46784 46785 4120e8 RegOpenKeyExA RegQueryValueExA RegCloseKey 46061->46785 46062->46061 46065 413a72 46063->46065 46064->46061 46066 401e45 22 API calls 46065->46066 46067 413a84 46066->46067 46780 40471d 88 API calls 46067->46780 46781 41a86b 30 API calls 46070->46781 46072->46061 46075->46061 46077->46061 46078->46061 46080 4144bf Sleep 46079->46080 46080->46061 46081->46061 46082->46061 46083->46061 46086->46061 46089->46061 46090 40415e 28 API calls 46090->46112 46091 419c8a 28 API calls 46091->46112 46092 419b16 28 API calls 46092->46112 46093 401e45 22 API calls 46094 413e7b GetTickCount 46093->46094 46786 419b16 28 API calls 46094->46786 46100 402e81 28 API calls 46100->46112 46101 402ef0 28 API calls 46101->46112 46102 408209 28 API calls 46102->46112 46105 401ee9 11 API calls 46105->46112 46108 402073 28 API calls 46108->46112 46109 4194da 79 API calls 46109->46112 46110 414461 CreateThread 46110->46112 46812 418ccd 102 API calls 46110->46812 46111 401fb8 11 API calls 46111->46112 46112->46061 46112->46090 46112->46091 46112->46092 46112->46093 46112->46100 46112->46101 46112->46102 46112->46105 46112->46108 46112->46109 46112->46110 46112->46111 46787 419ac6 GetLastInputInfo GetTickCount 46112->46787 46788 419a77 30 API calls ___scrt_get_show_window_mode 46112->46788 46789 40e2bb 29 API calls 46112->46789 46790 402f11 28 API calls 46112->46790 46791 40826c 28 API calls 46112->46791 46792 404a81 57 API calls ctype 46112->46792 46793 404bf0 94 API calls ___std_exception_copy 46112->46793 46794 409f9a 84 API calls 46112->46794 46113->45556 46114->45564 46115->45568 46118 4020bf 11 API calls 46117->46118 46119 408236 46118->46119 46120 403280 28 API calls 46119->46120 46121 408253 46120->46121 46121->45590 46123 40d5c5 46122->46123 46124 411f5e RegQueryValueExA RegCloseKey 46122->46124 46123->45587 46123->45611 46124->46123 46125->45593 46126->45613 46127->45641 46128->45613 46129->45622 46131 401f66 11 API calls 46130->46131 46132 40c609 46131->46132 46133 40c629 46132->46133 46134 40c65e 46132->46134 46136 40c61f 46132->46136 46813 41959f 29 API calls 46133->46813 46137 419f23 2 API calls 46134->46137 46135 40c752 GetLongPathNameW 46139 40415e 28 API calls 46135->46139 46136->46135 46140 40c663 46137->46140 46143 40c767 46139->46143 46144 40c667 46140->46144 46145 40c6b9 46140->46145 46141 40c632 46142 401ef3 28 API calls 46141->46142 46146 40c63c 46142->46146 46147 40415e 28 API calls 46143->46147 46149 40415e 28 API calls 46144->46149 46148 40415e 28 API calls 46145->46148 46153 401ee9 11 API calls 46146->46153 46150 40c776 46147->46150 46151 40c6c7 46148->46151 46152 40c675 46149->46152 46816 40c7f9 28 API calls 46150->46816 46157 40415e 28 API calls 46151->46157 46158 40415e 28 API calls 46152->46158 46153->46136 46155 40c789 46817 402f85 28 API calls 46155->46817 46161 40c6dd 46157->46161 46159 40c68b 46158->46159 46814 402f85 28 API calls 46159->46814 46160 40c794 46818 402f85 28 API calls 46160->46818 46815 402f85 28 API calls 46161->46815 46165 40c6e8 46169 401ef3 28 API calls 46165->46169 46166 40c696 46170 401ef3 28 API calls 46166->46170 46167 40c79e 46168 401ee9 11 API calls 46167->46168 46171 40c7a8 46168->46171 46172 40c6f3 46169->46172 46173 40c6a1 46170->46173 46174 401ee9 11 API calls 46171->46174 46175 401ee9 11 API calls 46172->46175 46176 401ee9 11 API calls 46173->46176 46177 40c7b1 46174->46177 46178 40c6fc 46175->46178 46179 40c6aa 46176->46179 46180 401ee9 11 API calls 46177->46180 46181 401ee9 11 API calls 46178->46181 46182 401ee9 11 API calls 46179->46182 46183 40c7ba 46180->46183 46181->46146 46182->46146 46184 401ee9 11 API calls 46183->46184 46185 40c7c3 46184->46185 46186 401ee9 11 API calls 46185->46186 46187 40c7cc 46186->46187 46187->45703 46188->45714 46189->45728 46190->45732 46191->45642 46192->45678 46193->45770 46194->45759 46195->45617 46198 4194b0 LoadResource LockResource SizeofResource 46197->46198 46199 40dd9e 46197->46199 46198->46199 46199->45816 46201 40209f 46200->46201 46209 4023ae 46201->46209 46203 4020aa 46213 4024ea 46203->46213 46205 4020b9 46205->45820 46207 402097 28 API calls 46206->46207 46208 406302 46207->46208 46208->45827 46210 402408 46209->46210 46211 4023b8 46209->46211 46210->46203 46211->46210 46220 402787 11 API calls std::_Deallocate 46211->46220 46214 4024fa 46213->46214 46215 402515 46214->46215 46216 402500 46214->46216 46231 4028c8 28 API calls 46215->46231 46221 402549 46216->46221 46219 402513 46219->46205 46220->46210 46232 402868 46221->46232 46223 40255d 46224 402572 46223->46224 46225 402587 46223->46225 46237 402a14 22 API calls 46224->46237 46239 4028c8 28 API calls 46225->46239 46228 40257b 46238 4029ba 22 API calls 46228->46238 46230 402585 46230->46219 46231->46219 46233 402870 46232->46233 46234 402878 46233->46234 46240 402c83 22 API calls 46233->46240 46234->46223 46237->46228 46238->46230 46239->46230 46242 4020c7 46241->46242 46243 4023ae 11 API calls 46242->46243 46244 4020d2 46243->46244 46244->45836 46245->45836 46247 41aba7 46246->46247 46248 41ac06 46247->46248 46252 41abb7 46247->46252 46249 41ac20 46248->46249 46250 41ad46 28 API calls 46248->46250 46267 41aec3 28 API calls 46249->46267 46250->46249 46253 41abef 46252->46253 46258 41ad46 46252->46258 46266 41aec3 28 API calls 46253->46266 46254 41ac02 46254->45836 46257->45845 46260 41ad4e 46258->46260 46259 41ad80 46259->46253 46260->46259 46261 41ad84 46260->46261 46264 41ad68 46260->46264 46278 402705 22 API calls 46261->46278 46268 41adb7 46264->46268 46266->46254 46267->46254 46269 41adc1 __EH_prolog 46268->46269 46279 4026f7 22 API calls 46269->46279 46271 41add4 46280 41aeda 11 API calls 46271->46280 46273 41adfa 46275 41ae32 46273->46275 46281 402710 11 API calls 46273->46281 46275->46259 46276 41ae19 46282 4026f2 11 API calls std::_Deallocate 46276->46282 46279->46271 46280->46273 46281->46276 46282->46275 46283->45859 46284->45864 46285->45861 46288 40328a 46287->46288 46290 4032a9 46288->46290 46291 4028c8 28 API calls 46288->46291 46290->45875 46291->46290 46293 4051db 46292->46293 46302 405254 46293->46302 46295 4051e8 46295->45878 46297 402041 46296->46297 46298 4023ae 11 API calls 46297->46298 46299 40205b 46298->46299 46326 40265a 46299->46326 46303 405262 46302->46303 46304 405268 46303->46304 46305 40527e 46303->46305 46313 4025d0 46304->46313 46307 4052d5 46305->46307 46308 405296 46305->46308 46323 402884 22 API calls 46307->46323 46312 40527c 46308->46312 46322 4028c8 28 API calls 46308->46322 46312->46295 46314 402868 22 API calls 46313->46314 46315 4025e2 46314->46315 46316 402652 46315->46316 46317 402609 46315->46317 46325 402884 22 API calls 46316->46325 46321 40261b 46317->46321 46324 4028c8 28 API calls 46317->46324 46321->46312 46322->46312 46324->46321 46327 40266b 46326->46327 46328 4023ae 11 API calls 46327->46328 46329 40206d 46328->46329 46329->45881 46330->45883 46331->45894 46333 419f30 GetCurrentProcess IsWow64Process 46332->46333 46334 4192bc 46332->46334 46333->46334 46335 419f47 46333->46335 46336 411f91 RegOpenKeyExA 46334->46336 46335->46334 46337 411fbf RegQueryValueExA RegCloseKey 46336->46337 46338 411fe9 46336->46338 46337->46338 46339 402073 28 API calls 46338->46339 46340 411ffe 46339->46340 46340->45902 46341->45910 46343 4024d9 46342->46343 46344 4024ea 28 API calls 46343->46344 46345 402091 46344->46345 46345->45658 46362 4397c5 46346->46362 46348 438c0b 46368 438557 35 API calls 2 library calls 46348->46368 46349 438bd0 46349->46348 46351 438be5 46349->46351 46361 438bea _strftime 46349->46361 46367 43ad91 20 API calls _Atexit 46351->46367 46354 438c17 46355 438c46 46354->46355 46369 43980a 39 API calls __Toupper 46354->46369 46358 438cb2 46355->46358 46370 439771 20 API calls 2 library calls 46355->46370 46371 439771 20 API calls 2 library calls 46358->46371 46359 438d79 _strftime 46359->46361 46372 43ad91 20 API calls _Atexit 46359->46372 46361->45939 46363 4397ca 46362->46363 46364 4397dd 46362->46364 46373 43ad91 20 API calls _Atexit 46363->46373 46364->46349 46366 4397cf _strftime 46366->46349 46367->46361 46368->46354 46369->46354 46370->46358 46371->46359 46372->46361 46373->46366 46380 401f90 46374->46380 46376 402efe 46377 402035 11 API calls 46376->46377 46378 402f0d 46377->46378 46378->45953 46379->45956 46381 4025d0 28 API calls 46380->46381 46382 401f9d 46381->46382 46382->46376 46384 401f6e 46383->46384 46422 402232 46384->46422 46386 401f79 46386->45966 46388 4080ae 46387->46388 46389 402232 11 API calls 46388->46389 46390 4080c8 46389->46390 46427 404247 46390->46427 46392 4080d6 46393 409203 46392->46393 46440 40a83c 46393->46440 46396 409257 46398 402073 28 API calls 46396->46398 46397 40922f 46399 402073 28 API calls 46397->46399 46400 409262 46398->46400 46401 409239 46399->46401 46402 402073 28 API calls 46400->46402 46444 419bca 28 API calls 46401->46444 46405 409271 46402->46405 46404 409247 46445 40a0b0 31 API calls ___std_exception_copy 46404->46445 46407 4194da 79 API calls 46405->46407 46409 409276 CreateThread 46407->46409 46408 40924e 46410 401fb8 11 API calls 46408->46410 46411 409291 CreateThread 46409->46411 46412 40929d CreateThread 46409->46412 46453 409305 46409->46453 46410->46396 46411->46412 46450 4092ef 46411->46450 46413 401ee9 11 API calls 46412->46413 46447 409311 46412->46447 46414 4092b1 46413->46414 46414->45985 46415->45981 46566 403202 46416->46566 46418 403002 46570 403242 46418->46570 46421->45998 46594 4092fb 159 API calls 46421->46594 46423 40228c 46422->46423 46424 40223c 46422->46424 46423->46386 46424->46423 46426 402759 11 API calls std::_Deallocate 46424->46426 46426->46423 46428 402868 22 API calls 46427->46428 46429 40425b 46428->46429 46430 404270 46429->46430 46431 404285 46429->46431 46437 4042bf 22 API calls 46430->46437 46439 4027c6 28 API calls 46431->46439 46434 404279 46438 402c28 22 API calls 46434->46438 46436 404283 46436->46392 46437->46434 46438->46436 46439->46436 46441 40a845 46440->46441 46442 409221 46440->46442 46446 40a8bc 28 API calls 46441->46446 46442->46396 46442->46397 46444->46404 46445->46408 46446->46442 46456 409c1f 46447->46456 46503 409340 46450->46503 46519 40971e 46453->46519 46457 409c2d 46456->46457 46458 40931a 46457->46458 46459 409c87 Sleep GetForegroundWindow GetWindowTextLengthW 46457->46459 46463 401f66 11 API calls 46457->46463 46493 43219b EnterCriticalSection LeaveCriticalSection WaitForSingleObjectEx __Init_thread_wait __Init_thread_footer 46457->46493 46494 432525 23 API calls __onexit 46457->46494 46495 43215c SetEvent ResetEvent EnterCriticalSection LeaveCriticalSection __Init_thread_footer 46457->46495 46487 40a854 46459->46487 46463->46457 46464 419ac6 GetLastInputInfo GetTickCount 46484 409ce7 46464->46484 46466 409ccd GetWindowTextW 46468 409cb2 46466->46468 46468->46466 46468->46484 46469 409e25 46471 401ee9 11 API calls 46469->46471 46470 40a83c 28 API calls 46470->46484 46471->46458 46472 409d92 Sleep 46472->46484 46475 402073 28 API calls 46475->46484 46476 4052dd 28 API calls 46476->46484 46477 408098 28 API calls 46477->46484 46479 408209 28 API calls 46479->46484 46481 402ff4 28 API calls 46481->46484 46483 40962e 12 API calls 46483->46484 46484->46457 46484->46464 46484->46469 46484->46470 46484->46472 46484->46475 46484->46476 46484->46477 46484->46479 46484->46481 46484->46483 46485 401ee9 11 API calls 46484->46485 46486 401fb8 11 API calls 46484->46486 46496 408080 28 API calls 46484->46496 46497 40a0b0 31 API calls ___std_exception_copy 46484->46497 46498 40a8cc 28 API calls 46484->46498 46499 40a694 40 API calls 2 library calls 46484->46499 46500 43f34f 20 API calls 46484->46500 46501 419bca 28 API calls 46484->46501 46485->46484 46486->46484 46488 40a85c 46487->46488 46489 402232 11 API calls 46488->46489 46490 40a867 46489->46490 46502 40a87c 28 API calls 46490->46502 46492 40a876 46492->46468 46494->46457 46495->46457 46496->46484 46497->46484 46498->46484 46499->46484 46500->46484 46501->46484 46502->46492 46504 409359 GetModuleHandleA SetWindowsHookExA 46503->46504 46505 4093bb GetMessageA 46503->46505 46504->46505 46508 409375 GetLastError 46504->46508 46506 4092f8 46505->46506 46507 4093cd TranslateMessage DispatchMessageA 46505->46507 46507->46505 46507->46506 46518 419b16 28 API calls 46508->46518 46510 409386 46511 4052dd 28 API calls 46510->46511 46512 409396 46511->46512 46513 402073 28 API calls 46512->46513 46514 4093a5 46513->46514 46515 4194da 79 API calls 46514->46515 46516 4093aa 46515->46516 46517 401fb8 11 API calls 46516->46517 46517->46506 46518->46510 46520 409733 Sleep 46519->46520 46540 40966d 46520->46540 46522 409745 46522->46520 46523 40930e 46522->46523 46524 409773 CreateDirectoryW 46522->46524 46525 409784 GetFileAttributesW 46522->46525 46526 40979b SetFileAttributesW 46522->46526 46529 401e45 22 API calls 46522->46529 46538 4097e6 46522->46538 46553 41a17b 46522->46553 46524->46522 46525->46522 46526->46522 46528 409815 PathFileExistsW 46528->46538 46529->46522 46530 4020bf 11 API calls 46530->46538 46532 402097 28 API calls 46532->46538 46533 40991e SetFileAttributesW 46533->46522 46534 4062ee 28 API calls 46534->46538 46535 401fc2 28 API calls 46535->46538 46536 401fb8 11 API calls 46536->46538 46538->46528 46538->46530 46538->46532 46538->46533 46538->46534 46538->46535 46538->46536 46539 401fb8 11 API calls 46538->46539 46563 41a20f 32 API calls 46538->46563 46564 41a27c CreateFileW SetFilePointer CloseHandle WriteFile CloseHandle 46538->46564 46539->46522 46541 40971a 46540->46541 46544 409683 46540->46544 46541->46522 46542 4096a2 CreateFileW 46543 4096b0 GetFileSize 46542->46543 46542->46544 46543->46544 46545 4096e5 CloseHandle 46543->46545 46544->46542 46544->46545 46546 4096d3 46544->46546 46547 4096da Sleep 46544->46547 46548 4096f7 46544->46548 46545->46544 46565 40a025 83 API calls 46546->46565 46547->46545 46548->46541 46550 408098 28 API calls 46548->46550 46551 409713 46550->46551 46552 409203 124 API calls 46551->46552 46552->46541 46554 41a18e CreateFileW 46553->46554 46556 41a1c7 46554->46556 46557 41a1cb 46554->46557 46556->46522 46558 41a1d2 SetFilePointer 46557->46558 46559 41a1eb WriteFile 46557->46559 46558->46559 46562 41a1e2 CloseHandle 46558->46562 46560 41a200 CloseHandle 46559->46560 46561 41a1fe 46559->46561 46560->46556 46561->46560 46562->46556 46563->46538 46564->46538 46565->46547 46567 40320e 46566->46567 46576 4035f8 46567->46576 46569 40321b 46569->46418 46571 40324e 46570->46571 46572 402232 11 API calls 46571->46572 46573 403268 46572->46573 46590 402316 46573->46590 46577 403606 46576->46577 46578 403624 46577->46578 46579 40360c 46577->46579 46580 40363c 46578->46580 46581 40367e 46578->46581 46587 403686 28 API calls 46579->46587 46586 403622 46580->46586 46588 4027c6 28 API calls 46580->46588 46589 402884 22 API calls 46581->46589 46586->46569 46587->46586 46588->46586 46591 402327 46590->46591 46592 402232 11 API calls 46591->46592 46593 4023a7 46592->46593 46593->45993 46596 404166 46595->46596 46597 402232 11 API calls 46596->46597 46598 404171 46597->46598 46606 40419c 46598->46606 46601 4042dc 46618 404333 46601->46618 46603 4042ea 46604 403242 11 API calls 46603->46604 46605 4042f9 46604->46605 46605->46006 46607 4041a8 46606->46607 46610 4041b9 46607->46610 46609 40417c 46609->46601 46611 4041c9 46610->46611 46612 4041e6 46611->46612 46613 4041cf 46611->46613 46617 4027c6 28 API calls 46612->46617 46615 404247 28 API calls 46613->46615 46616 4041e4 46615->46616 46616->46609 46617->46616 46619 40433f 46618->46619 46622 404351 46619->46622 46621 40434d 46621->46603 46623 40435f 46622->46623 46624 404365 46623->46624 46625 40437e 46623->46625 46685 4034c6 28 API calls 46624->46685 46626 402868 22 API calls 46625->46626 46627 404386 46626->46627 46629 4043f9 46627->46629 46630 40439f 46627->46630 46687 402884 22 API calls 46629->46687 46641 40437c 46630->46641 46686 4027c6 28 API calls 46630->46686 46641->46621 46685->46641 46686->46641 46688->46020 46693 4198da ctype ___scrt_get_show_window_mode 46690->46693 46691 402073 28 API calls 46692 41399f 46691->46692 46692->46031 46693->46691 46695 413958 getaddrinfo WSASetLastError 46694->46695 46696 41394e 46694->46696 46695->46061 46795 4137dc 29 API calls ___std_exception_copy 46696->46795 46698 413953 46698->46695 46700 404f4e 46699->46700 46701 404f45 46699->46701 46700->46061 46701->46700 46796 419b16 28 API calls 46701->46796 46703 404f71 46704 4052dd 28 API calls 46703->46704 46705 404f81 46704->46705 46706 402073 28 API calls 46705->46706 46707 404f90 46706->46707 46708 4194da 79 API calls 46707->46708 46709 404f95 46708->46709 46710 401fb8 11 API calls 46709->46710 46710->46700 46712 4048c6 46711->46712 46713 4048ce 46712->46713 46718 4049fb 46712->46718 46714 404903 46713->46714 46716 4052fe 28 API calls 46713->46716 46762 40495e 46713->46762 46797 41ea15 27 API calls 46714->46797 46717 4048ef 46716->46717 46720 402073 28 API calls 46717->46720 46721 404912 46718->46721 46722 404a16 46718->46722 46718->46762 46719 40490b 46719->46721 46723 404921 46719->46723 46724 4048fe 46720->46724 46726 402073 28 API calls 46721->46726 46808 41a86b 30 API calls 46722->46808 46731 404930 46723->46731 46732 404967 46723->46732 46727 4194da 79 API calls 46724->46727 46729 404a60 46726->46729 46727->46714 46728 404a20 46730 4052dd 28 API calls 46728->46730 46733 402073 28 API calls 46729->46733 46735 404a30 46730->46735 46736 402073 28 API calls 46731->46736 46805 41f7f5 53 API calls 46732->46805 46737 404a6f 46733->46737 46739 402073 28 API calls 46735->46739 46740 40493f 46736->46740 46741 4194da 79 API calls 46737->46741 46738 40496f 46742 4049a4 46738->46742 46743 404974 46738->46743 46744 404a3f 46739->46744 46745 402073 28 API calls 46740->46745 46741->46762 46807 41ebbb 28 API calls 46742->46807 46748 402073 28 API calls 46743->46748 46749 4194da 79 API calls 46744->46749 46746 40494e 46745->46746 46750 4194da 79 API calls 46746->46750 46752 404983 46748->46752 46753 404a44 46749->46753 46754 404953 46750->46754 46751 4049ac 46755 4049d9 CreateEventW 46751->46755 46758 402073 28 API calls 46751->46758 46756 402073 28 API calls 46752->46756 46757 401fb8 11 API calls 46753->46757 46798 41ea55 46754->46798 46755->46762 46759 404992 46756->46759 46757->46762 46761 4049c2 46758->46761 46763 4194da 79 API calls 46759->46763 46764 402073 28 API calls 46761->46764 46762->46061 46765 404997 46763->46765 46767 4049d1 46764->46767 46806 41ee67 51 API calls 46765->46806 46768 4194da 79 API calls 46767->46768 46769 4049d6 46768->46769 46769->46755 46771 404e1a 46770->46771 46772 404e53 46771->46772 46773 404e5a 46771->46773 46779 404e20 46771->46779 46811 4050c4 83 API calls 46772->46811 46775 41ea55 3 API calls 46773->46775 46773->46779 46776 404e7b 46775->46776 46777 41ea55 3 API calls 46776->46777 46778 404e93 SetEvent 46777->46778 46778->46779 46779->46061 46780->46061 46781->46061 46782->46061 46783->46061 46784->46061 46785->46061 46786->46112 46787->46112 46788->46112 46789->46112 46790->46112 46791->46112 46792->46112 46793->46112 46794->46112 46795->46698 46796->46703 46797->46719 46799 41c4c6 46798->46799 46800 41ea5d 46798->46800 46801 41c4d4 46799->46801 46809 41b610 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 46799->46809 46800->46762 46810 41c1f6 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 46801->46810 46804 41c4db 46805->46738 46806->46754 46807->46751 46808->46728 46809->46801 46810->46804 46811->46773 46813->46141 46814->46166 46815->46165 46816->46155 46817->46160 46818->46167 46821 40e1a8 46819->46821 46820 411f34 3 API calls 46820->46821 46821->46820 46822 40e24e 46821->46822 46824 40e23e Sleep 46821->46824 46841 40e1da 46821->46841 46825 408098 28 API calls 46822->46825 46823 408098 28 API calls 46823->46841 46824->46821 46828 40e25b 46825->46828 46855 419bca 28 API calls 46828->46855 46830 40e267 46856 412204 14 API calls 46830->46856 46833 401ee9 11 API calls 46833->46841 46834 40e27a 46835 401ee9 11 API calls 46834->46835 46837 40e286 46835->46837 46836 402073 28 API calls 46836->46841 46838 402073 28 API calls 46837->46838 46839 40e297 46838->46839 46842 41215f 14 API calls 46839->46842 46840 41215f 14 API calls 46840->46841 46841->46823 46841->46824 46841->46833 46841->46836 46841->46840 46852 40bc59 107 API calls ___scrt_get_show_window_mode 46841->46852 46853 419bca 28 API calls 46841->46853 46854 412204 14 API calls 46841->46854 46843 40e2aa 46842->46843 46857 4112b5 TerminateProcess WaitForSingleObject 46843->46857 46845 40e2b2 ExitProcess 46858 411253 58 API calls 46847->46858 46853->46841 46854->46841 46855->46830 46856->46834 46857->46845

                            Control-flow Graph

                            APIs
                            • LoadLibraryA.KERNELBASE(Psapi.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A8EF
                            • GetProcAddress.KERNEL32(00000000), ref: 0041A8F8
                            • GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A90F
                            • GetProcAddress.KERNEL32(00000000), ref: 0041A912
                            • LoadLibraryA.KERNEL32(Psapi.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A924
                            • GetProcAddress.KERNEL32(00000000), ref: 0041A927
                            • GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A93D
                            • GetProcAddress.KERNEL32(00000000), ref: 0041A940
                            • GetModuleHandleA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D40C), ref: 0041A951
                            • GetProcAddress.KERNEL32(00000000), ref: 0041A954
                            • GetModuleHandleA.KERNEL32(user32,SetProcessDpiAware,?,?,?,?,0040D40C), ref: 0041A969
                            • GetProcAddress.KERNEL32(00000000), ref: 0041A96C
                            • LoadLibraryA.KERNEL32(ntdll.dll,NtUnmapViewOfSection,?,?,?,?,0040D40C), ref: 0041A97D
                            • GetProcAddress.KERNEL32(00000000), ref: 0041A980
                            • LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatusEx,?,?,?,?,0040D40C), ref: 0041A98C
                            • GetProcAddress.KERNEL32(00000000), ref: 0041A98F
                            • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D40C), ref: 0041A9A1
                            • GetProcAddress.KERNEL32(00000000), ref: 0041A9A4
                            • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D40C), ref: 0041A9B1
                            • GetProcAddress.KERNEL32(00000000), ref: 0041A9B4
                            • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D40C), ref: 0041A9C5
                            • GetProcAddress.KERNEL32(00000000), ref: 0041A9C8
                            • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D40C), ref: 0041A9D5
                            • GetProcAddress.KERNEL32(00000000), ref: 0041A9D8
                            • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D40C), ref: 0041A9EA
                            • GetProcAddress.KERNEL32(00000000), ref: 0041A9ED
                            • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D40C), ref: 0041A9FA
                            • GetProcAddress.KERNEL32(00000000), ref: 0041A9FD
                            • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D40C), ref: 0041AA0A
                            • GetProcAddress.KERNEL32(00000000), ref: 0041AA0D
                            • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemTimes,?,?,?,?,0040D40C), ref: 0041AA1F
                            • GetProcAddress.KERNEL32(00000000), ref: 0041AA22
                            • LoadLibraryA.KERNEL32(Shlwapi.dll,0000000C,?,?,?,?,0040D40C), ref: 0041AA30
                            • GetProcAddress.KERNEL32(00000000), ref: 0041AA33
                            • LoadLibraryA.KERNEL32(kernel32.dll,GetConsoleWindow,?,?,?,?,0040D40C), ref: 0041AA40
                            • GetProcAddress.KERNEL32(00000000), ref: 0041AA43
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: AddressProc$HandleModule$LibraryLoad
                            • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetModuleFileNameExA$GetModuleFileNameExW$GetMonitorInfoW$GetSystemTimes$GlobalMemoryStatusEx$IsUserAnAdmin$IsWow64Process$Kernel32.dll$NtUnmapViewOfSection$Psapi.dll$SetProcessDEPPolicy$SetProcessDpiAware$SetProcessDpiAwareness$Shell32$Shlwapi.dll$kernel32$kernel32.dll$ntdll.dll$shcore$user32
                            • API String ID: 551388010-2474455403
                            • Opcode ID: e80cee8c84c8c84204283680f0404711a146afcd0be7a07adf6e8d3a182e926f
                            • Instruction ID: 1e7ebd14e1f9a52016720e07cc743ec1e909bc11fdf6f09267ddb838bd68d733
                            • Opcode Fuzzy Hash: e80cee8c84c8c84204283680f0404711a146afcd0be7a07adf6e8d3a182e926f
                            • Instruction Fuzzy Hash: 9031EBF0E413587ADB207BBA5C09E5B3E9CDA80794711052BB408D3661FAFC9C448E6E

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 7 40d3f0-40d45f call 41a8da call 40dd83 call 4020d6 * 2 call 419d87 call 40e563 call 401e6d call 43a300 24 40d461-40d4b5 call 40e609 call 401e45 call 401f8b call 40f98d call 40e5ba call 40dd70 call 401fb8 7->24 25 40d4b8-40d57f call 401e45 call 401f8b call 401e45 call 4052fe call 408209 call 401fc2 call 401fb8 * 2 call 401e45 call 401fa0 call 405a86 call 401e45 call 4051c3 call 401e45 call 4051c3 7->25 70 40d581-40d5c9 call 40822a call 401fc2 call 401fb8 call 401f8b call 411f34 25->70 71 40d5cf-40d5ea call 401e45 call 40fbab 25->71 70->71 105 40dd0f-40dd27 call 401f8b call 41239a call 410eda 70->105 80 40d656-40d679 call 401f8b CreateMutexA GetLastError 71->80 81 40d5ec-40d60d call 401e45 call 401f8b OpenMutexA 71->81 91 40d991-40d99a call 401fb8 80->91 92 40d67f-40d686 80->92 101 40d622-40d63f call 401f8b call 411f34 81->101 102 40d60f-40d61c WaitForSingleObject CloseHandle 81->102 109 40d9a1-40da01 call 434c30 call 40245c call 401f8b * 2 call 4120e8 call 408093 91->109 96 40d688 92->96 97 40d68a-40d6a7 GetModuleFileNameW call 4192ae 92->97 96->97 107 40d6b0-40d6b4 97->107 108 40d6a9-40d6ab 97->108 122 40d651 101->122 123 40d641-40d650 call 401f8b call 41239a 101->123 102->101 137 40dd2c 105->137 113 40d6b6-40d6c9 call 401e45 call 401f8b 107->113 114 40d717-40d72a call 401e45 call 401f8b 107->114 108->107 175 40da06-40da5f call 401e45 call 401f8b call 402073 call 401f8b call 41215f call 401e45 call 401f8b call 439867 109->175 113->114 142 40d6cb-40d6d1 113->142 138 40d731-40d7ad call 401e45 call 401f8b call 408093 call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b 114->138 139 40d72c call 40e501 114->139 122->80 123->122 143 40dd31-40dd65 call 402073 call 4052dd call 402073 call 4194da call 401fb8 137->143 217 40d815-40d819 138->217 218 40d7af-40d7c8 call 401e45 call 401f8b call 439891 138->218 139->138 142->114 148 40d6d3-40d6d9 142->148 188 40dd6a-40dd6f call 413980 143->188 153 40d6f7-40d710 call 401f8b call 411eea 148->153 154 40d6db-40d6ee call 4060ea 148->154 153->114 179 40d712 call 4066a6 153->179 154->114 166 40d6f0-40d6f5 call 4067a0 154->166 166->114 220 40da61-40da63 175->220 221 40da65-40da67 175->221 179->114 217->109 219 40d81f-40d826 217->219 218->217 247 40d7ca-40d810 call 401e45 call 401f8b call 401e45 call 401f8b call 40c5ed call 401ef3 call 401ee9 218->247 223 40d8a7-40d8b1 call 408093 219->223 224 40d828-40d8a5 call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 40b871 219->224 225 40da6b-40da7c call 41aa4f CreateThread 220->225 226 40da69 221->226 227 40da7e-40db48 call 402073 * 2 call 4194da call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 439867 call 401e45 call 401f8b call 401e45 call 401f8b call 408f1f call 401e45 call 401f8b 221->227 236 40d8b6-40d8de call 40245c call 43254d 223->236 224->236 225->227 226->225 349 40db83-40db9a call 401e45 call 401f8b 227->349 350 40db4a-40db81 call 43229f call 401e45 call 401f8b CreateThread 227->350 255 40d8f0 236->255 256 40d8e0-40d8ee call 434c30 236->256 247->217 262 40d8f2-40d93d call 401ee4 call 43a796 call 40245c call 401f8b call 40245c call 401f8b call 412338 255->262 256->262 316 40d942-40d967 call 432556 call 401e45 call 40fbab 262->316 316->175 332 40d96d-40d98c call 401e45 call 419bca call 40de34 316->332 332->175 345 40d98e-40d990 332->345 345->91 360 40dbd9-40dbeb call 401e45 call 401f8b 349->360 361 40db9c-40dbd4 call 43229f call 401e45 call 401f8b CreateThread 349->361 350->349 372 40dc4c-40dc5e call 401e45 call 401f8b 360->372 373 40dbed-40dc47 call 401e45 call 401f8b call 401e45 call 401f8b call 40c5a1 call 401ef3 call 401ee9 CreateThread 360->373 361->360 383 40dc60-40dc94 call 401e45 call 401f8b call 401e45 call 401f8b call 439867 call 40b0a3 372->383 384 40dc99-40dcbf call 4195f8 call 401ef3 call 401ee9 372->384 373->372 383->384 406 40dcc1-40dcc2 SetProcessDEPPolicy 384->406 407 40dcc4-40dcd7 CreateThread 384->407 406->407 408 40dce5-40dcec 407->408 409 40dcd9-40dce3 CreateThread 407->409 412 40dcfa-40dd01 408->412 413 40dcee-40dcf8 CreateThread 408->413 409->408 412->137 416 40dd03-40dd06 412->416 413->412 416->188 418 40dd08-40dd0d 416->418 418->143
                            APIs
                              • Part of subcall function 0041A8DA: LoadLibraryA.KERNELBASE(Psapi.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A8EF
                              • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A8F8
                              • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A90F
                              • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A912
                              • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(Psapi.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A924
                              • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A927
                              • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A93D
                              • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A940
                              • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D40C), ref: 0041A951
                              • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A954
                              • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,SetProcessDpiAware,?,?,?,?,0040D40C), ref: 0041A969
                              • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A96C
                              • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(ntdll.dll,NtUnmapViewOfSection,?,?,?,?,0040D40C), ref: 0041A97D
                              • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A980
                              • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatusEx,?,?,?,?,0040D40C), ref: 0041A98C
                              • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A98F
                              • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D40C), ref: 0041A9A1
                              • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9A4
                              • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D40C), ref: 0041A9B1
                              • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9B4
                              • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D40C), ref: 0041A9C5
                              • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9C8
                              • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D40C), ref: 0041A9D5
                              • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9D8
                              • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D40C), ref: 0041A9EA
                              • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9ED
                              • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D40C), ref: 0041A9FA
                              • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9FD
                            • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 0040D603
                              • Part of subcall function 0040F98D: __EH_prolog.LIBCMT ref: 0040F992
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: AddressProc$HandleModule$LibraryLoad$H_prologMutexOpen
                            • String ID: (#G$Access Level: $Administrator$C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe$Chrorne-CKQJ2Y$Exe$Exe$H"G$H"G$Inj$Remcos Agent initialized$Rmc$Software\$User$XIK$`"G$exepath$licence$license_code.txt$origmsc
                            • API String ID: 1529173511-349030685
                            • Opcode ID: 313a21e1b22f9af243aca3de9b9244f7f815028f10679997bb012a60d749383a
                            • Instruction ID: a36e185f3bd9362bdba41541190492353975b392bf08c7d21c2bc217d0697d36
                            • Opcode Fuzzy Hash: 313a21e1b22f9af243aca3de9b9244f7f815028f10679997bb012a60d749383a
                            • Instruction Fuzzy Hash: 5622B960B043412BDA1577B69C67A7E25998F81708F04483FF946BB2E3EEBC4D05839E

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1217 409340-409357 1218 409359-409373 GetModuleHandleA SetWindowsHookExA 1217->1218 1219 4093bb-4093cb GetMessageA 1217->1219 1218->1219 1222 409375-4093b9 GetLastError call 419b16 call 4052dd call 402073 call 4194da call 401fb8 1218->1222 1220 4093e7 1219->1220 1221 4093cd-4093e5 TranslateMessage DispatchMessageA 1219->1221 1223 4093e9-4093ee 1220->1223 1221->1219 1221->1220 1222->1223
                            APIs
                            • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040935B
                            • SetWindowsHookExA.USER32(0000000D,0040932C,00000000), ref: 00409369
                            • GetLastError.KERNEL32 ref: 00409375
                              • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004093C3
                            • TranslateMessage.USER32(?), ref: 004093D2
                            • DispatchMessageA.USER32(?), ref: 004093DD
                            Strings
                            • Keylogger initialization failure: error , xrefs: 00409389
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                            • String ID: Keylogger initialization failure: error
                            • API String ID: 3219506041-952744263
                            • Opcode ID: cfd85c535bb0db94fb89dc6c4df829e687b8f2a6419d7d210f0f2ce5eeb3337a
                            • Instruction ID: 7386389ed158dc1e9b291cee6df9fe5cdc6a320468782ebba6dd7d831fd8f91b
                            • Opcode Fuzzy Hash: cfd85c535bb0db94fb89dc6c4df829e687b8f2a6419d7d210f0f2ce5eeb3337a
                            • Instruction Fuzzy Hash: 4D119431604301ABC7107B769D0985BB7ECEB99712B500A7EFC95D32D2EB74C900CB6A

                            Control-flow Graph

                            APIs
                              • Part of subcall function 00411F34: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 00411F54
                              • Part of subcall function 00411F34: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,00472200), ref: 00411F72
                              • Part of subcall function 00411F34: RegCloseKey.KERNELBASE(?), ref: 00411F7D
                            • Sleep.KERNELBASE(00000BB8), ref: 0040E243
                            • ExitProcess.KERNEL32 ref: 0040E2B4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseExitOpenProcessQuerySleepValue
                            • String ID: 3.8.0 Pro$XIK$override$pth_unenc
                            • API String ID: 2281282204-1607991370
                            • Opcode ID: 562c24c15cc7cb3882e8d325af78fd96e13e1412e4962ce4733eb1e08c79d7b0
                            • Instruction ID: b884fba6e00cc138548ee74cf6c0f0a6577cc223cd772b3e63c92b5116f64211
                            • Opcode Fuzzy Hash: 562c24c15cc7cb3882e8d325af78fd96e13e1412e4962ce4733eb1e08c79d7b0
                            • Instruction Fuzzy Hash: 6E213770B4030027DA08B6768D5BAAE35899B82708F40446FF911AB2D7EEBD8D4583DF
                            APIs
                            • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,00431274,00000034,?,?,004D3838), ref: 004315FE
                            • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00431307,00000000,?,00000000), ref: 00431614
                            • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,00431307,00000000,?,00000000,0041C006), ref: 00431626
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Crypt$Context$AcquireRandomRelease
                            • String ID:
                            • API String ID: 1815803762-0
                            • Opcode ID: 490f37dff30391dd88b2b348f1e17f82ee14bc365aa64bdd7ac48a14519942bc
                            • Instruction ID: e2f248fbd61bea3c509e9dcbc4a9d000159a3c4e1760f154dd59208f6820a057
                            • Opcode Fuzzy Hash: 490f37dff30391dd88b2b348f1e17f82ee14bc365aa64bdd7ac48a14519942bc
                            • Instruction Fuzzy Hash: FDE0923130C310BBEB304F51AC09F172A55EB8DB72FA5063AF112E50F4D6518801855C
                            APIs
                            • GetComputerNameExW.KERNELBASE(00000001,?,00000037,00471FFC), ref: 00419615
                            • GetUserNameW.ADVAPI32(?,00000010), ref: 0041962D
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Name$ComputerUser
                            • String ID:
                            • API String ID: 4229901323-0
                            • Opcode ID: bc1d19bd62bd99057b7f44f52ab1f34f4f39e14c1e12de22008ea1118711f052
                            • Instruction ID: 5ca8c18713c22ae7facf93a828c8627c995cdb1c7496207664ac88b3b4335c79
                            • Opcode Fuzzy Hash: bc1d19bd62bd99057b7f44f52ab1f34f4f39e14c1e12de22008ea1118711f052
                            • Instruction Fuzzy Hash: 7C01FF7290011CABCB04EBD5DC45EDEB7BCEF44319F10016AB505B61A5EEB46A89CB98
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: recv
                            • String ID:
                            • API String ID: 1507349165-0
                            • Opcode ID: 3ba0adabb739ddff39a3f19a3894bbfe9ce5bc94458df24d68493e41c2bfa472
                            • Instruction ID: 0df3b2746f7319e4a339c8fc0296cb6b5099ceb5184c402daa9575d879af207d
                            • Opcode Fuzzy Hash: 3ba0adabb739ddff39a3f19a3894bbfe9ce5bc94458df24d68493e41c2bfa472
                            • Instruction Fuzzy Hash: 81B09B75105201BFC6150750CD0486E7DA597C8381B40491CB14641171C535C4505715

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 420 413980-4139c8 call 4020bf call 419894 call 4020bf call 401e45 call 401f8b call 439867 433 4139d7-413a23 call 402073 call 401e45 call 4020d6 call 419d87 call 40487e call 401e45 call 40fbab 420->433 434 4139ca-4139d1 Sleep 420->434 449 413a25-413a94 call 401e45 call 40245c call 401e45 call 401f8b call 401e45 call 40245c call 401e45 call 401f8b call 401e45 call 40245c call 401e45 call 401f8b call 40471d 433->449 450 413a97-413b32 call 402073 call 401e45 call 4020d6 call 419d87 call 401e45 * 2 call 40822a call 402ef0 call 401fc2 call 401fb8 * 2 call 401e45 call 405ae5 433->450 434->433 449->450 503 413b42-413b49 450->503 504 413b34-413b40 450->504 505 413b4e-413be0 call 405a86 call 4052fe call 408209 call 402ef0 call 402073 call 4194da call 401fb8 * 2 call 401e45 call 401f8b call 401e45 call 401f8b call 41393f 503->505 504->505 532 413be2-413c26 WSAGetLastError call 41a86b call 4052dd call 402073 call 4194da call 401fb8 505->532 533 413c2b-413c39 call 40480d 505->533 554 414493-4144a5 call 404e06 call 4021da 532->554 538 413c66-413c74 call 404f31 call 4048a8 533->538 539 413c3b-413c61 call 402073 * 2 call 4194da 533->539 550 413c79-413c7b 538->550 539->554 553 413c81-413dd4 call 401e45 * 2 call 4052fe call 408209 call 402ef0 call 408209 call 402ef0 call 402073 call 4194da call 401fb8 * 4 call 4197c1 call 413013 call 408098 call 43f34f call 401e45 call 4020d6 call 40245c call 401f8b * 2 call 4120e8 550->553 550->554 620 413dd6-413de3 call 405a86 553->620 621 413de8-413e0f call 401f8b call 411f91 553->621 569 4144a7-4144c7 call 401e45 call 401f8b call 439867 Sleep 554->569 570 4144cd-4144d5 call 401e6d 554->570 569->570 570->450 620->621 627 413e11-413e13 621->627 628 413e16-414406 call 40415e call 419c8a call 419b16 call 401e45 GetTickCount call 419b16 call 419ac6 call 419b16 call 419a77 call 419c8a * 5 call 40e2bb call 419c8a call 402f11 call 402e81 call 402ef0 call 402e81 call 402ef0 * 3 call 402e81 call 402ef0 call 408209 call 402ef0 call 408209 call 402ef0 call 402e81 call 402ef0 call 402e81 call 402ef0 call 402e81 call 402ef0 call 402e81 call 402ef0 call 40826c call 402ef0 call 402e81 call 402ef0 call 402e81 call 402ef0 call 408209 call 402ef0 * 5 call 402e81 call 402ef0 call 402e81 call 402ef0 * 6 call 404a81 call 401fb8 * 48 call 401ee9 call 401fb8 * 4 call 401ee9 call 404bf0 621->628 627->628 856 414408-41440f 628->856 857 41441a-414421 628->857 856->857 860 414411-414413 856->860 858 414423-414428 call 409f9a 857->858 859 41442d-41445f call 405a4b call 402073 * 2 call 4194da 857->859 858->859 871 414461-41446d CreateThread 859->871 872 414473-41448e call 401fb8 * 2 call 401ee9 859->872 860->857 871->872 872->554
                            APIs
                            • Sleep.KERNEL32(00000000,00000029,76F90F10,00471FFC,00000000), ref: 004139D1
                            • WSAGetLastError.WS2_32(00000000,00000001), ref: 00413BE2
                            • Sleep.KERNELBASE(00000000,00000002), ref: 004144C7
                              • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Sleep$ErrorLastLocalTime
                            • String ID: | $%I64u$3.8.0 Pro$C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe$Chrorne-CKQJ2Y$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$Exe$H"G$P0F$TLS Off$TLS On $XIK$`"G$hlight$name
                            • API String ID: 524882891-1905679455
                            • Opcode ID: 12cee51c1aded5413bdde5bed6977f1927e459815fd29736216c82245a82c304
                            • Instruction ID: 5f58eceae2704c6c0e376aa481a0c6a7ef3cc820e2c63ea8d389b44db61c6c97
                            • Opcode Fuzzy Hash: 12cee51c1aded5413bdde5bed6977f1927e459815fd29736216c82245a82c304
                            • Instruction Fuzzy Hash: 9F42AE31A001055BCB18F765DDA6AEEB3699F90308F1041BFF40A721E2EF785F868A5D

                            Control-flow Graph

                            APIs
                            • __Init_thread_footer.LIBCMT ref: 00409C81
                            • Sleep.KERNELBASE(000001F4), ref: 00409C8C
                            • GetForegroundWindow.USER32 ref: 00409C92
                            • GetWindowTextLengthW.USER32(00000000), ref: 00409C9B
                            • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 00409CCF
                            • Sleep.KERNEL32(000003E8), ref: 00409D9D
                              • Part of subcall function 0040962E: SetEvent.KERNEL32(?,?,?,0040A77B,?,?,?,?,?,00000000), ref: 0040965A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                            • String ID: [${ User has been idle for $ minutes }$]
                            • API String ID: 911427763-3954389425
                            • Opcode ID: 19a43bdacbb328f3271daa1859423f0074a75d4c81a0c0d14bd138b107996052
                            • Instruction ID: 7a62ae1493acfbf190be1d0992f15f5c774c3bdccfea44e4f2dca48363f02a21
                            • Opcode Fuzzy Hash: 19a43bdacbb328f3271daa1859423f0074a75d4c81a0c0d14bd138b107996052
                            • Instruction Fuzzy Hash: 7C5193716043405BD304FB61D855A6EB795AF84308F50093FF486A62E3DF7CAE45C69A

                            Control-flow Graph

                            APIs
                            • GetLongPathNameW.KERNELBASE(00000000,?,00000208), ref: 0040C753
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: LongNamePath
                            • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                            • API String ID: 82841172-425784914
                            • Opcode ID: 083331452e3a6aa89c56e4b14e0f70a1cfa2dfea658c43d64406b056490d91a9
                            • Instruction ID: e0747f7f0ded3e76473395fd4b63a7f1dfd4675be44f898a7a0c8db3d1efc66a
                            • Opcode Fuzzy Hash: 083331452e3a6aa89c56e4b14e0f70a1cfa2dfea658c43d64406b056490d91a9
                            • Instruction Fuzzy Hash: EB4168315042419AC204FB62DC929EFB7E8AEA4759F10063FF541720E2EF799E49C99F

                            Control-flow Graph

                            APIs
                            • Sleep.KERNELBASE(00001388), ref: 00409738
                              • Part of subcall function 0040966D: CreateFileW.KERNELBASE(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409745), ref: 004096A3
                              • Part of subcall function 0040966D: GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409745), ref: 004096B2
                              • Part of subcall function 0040966D: Sleep.KERNEL32(00002710,?,?,?,00409745), ref: 004096DF
                              • Part of subcall function 0040966D: CloseHandle.KERNELBASE(00000000,?,?,?,00409745), ref: 004096E6
                            • CreateDirectoryW.KERNELBASE(00000000,00000000), ref: 00409774
                            • GetFileAttributesW.KERNELBASE(00000000), ref: 00409785
                            • SetFileAttributesW.KERNELBASE(00000000,00000080), ref: 0040979C
                            • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 00409816
                              • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                            • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00469654,?,00000000,00000000,00000000,00000000,00000000), ref: 0040991F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                            • String ID: H"G$H"G$heL
                            • API String ID: 3795512280-1380758299
                            • Opcode ID: 68988a29ccaa6e392556ac7b0c9d46212b0f36ba1062d99da71ccd577ab96135
                            • Instruction ID: 85d6828eff9e87111454ffe40de9a07a949f8ec8799fb43d86416e8e02d17308
                            • Opcode Fuzzy Hash: 68988a29ccaa6e392556ac7b0c9d46212b0f36ba1062d99da71ccd577ab96135
                            • Instruction Fuzzy Hash: 9D513D712043015BCB14BB72C9A6ABF76999F90308F00453FB946B72E3DF7D9D09869A

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1139 4048a8-4048bd 1140 4048c6-4048c8 1139->1140 1141 4049fb-4049ff 1140->1141 1142 4048ce-4048d1 1140->1142 1143 404a01-404a0f 1141->1143 1144 404a77 1141->1144 1145 4049f7-4049f9 1142->1145 1146 4048d7-4048da 1142->1146 1143->1144 1154 404a11-404a14 1143->1154 1147 404a79-404a7e 1144->1147 1145->1147 1148 404906-404910 call 41ea15 1146->1148 1149 4048dc-404903 call 4052fe call 402073 call 4194da 1146->1149 1159 404921-40492e call 41ec44 1148->1159 1160 404912-40491c 1148->1160 1149->1148 1157 404a51-404a56 1154->1157 1158 404a16-404a4f call 41a86b call 4052dd call 402073 call 4194da call 401fb8 1154->1158 1161 404a5b-404a74 call 402073 * 2 call 4194da 1157->1161 1158->1144 1172 404930-404953 call 402073 * 2 call 4194da 1159->1172 1173 404967-404972 call 41f7f5 1159->1173 1160->1161 1161->1144 1201 404956-404962 call 41ea55 1172->1201 1183 4049a4-4049b1 call 41ebbb 1173->1183 1184 404974-4049a2 call 402073 * 2 call 4194da call 41ee67 1173->1184 1197 4049b3-4049d6 call 402073 * 2 call 4194da 1183->1197 1198 4049d9-4049f4 CreateEventW 1183->1198 1184->1201 1197->1198 1198->1145 1201->1144
                            APIs
                              • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                            • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 004049E0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CreateEventLocalTime
                            • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                            • API String ID: 2082726707-2151626615
                            • Opcode ID: 9e7b53902abc1f377988b37ae83fe15db9d764b0bd0c64e2f09a045c30204dd4
                            • Instruction ID: f1749a2af40dec866484330b2464a30bcc7489b9f615ba144f2b3c776ade1d80
                            • Opcode Fuzzy Hash: 9e7b53902abc1f377988b37ae83fe15db9d764b0bd0c64e2f09a045c30204dd4
                            • Instruction Fuzzy Hash: 37412AB5B406017BD608777A8E1B96E7625AB81304B50017FF901136D2EBBD9C2197DF

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1281 4192ae-419305 call 419f23 call 411f91 call 401fc2 call 401fb8 call 4060ea 1292 419307-419316 call 411f91 1281->1292 1293 419348-419351 1281->1293 1298 41931b-419332 call 401f8b StrToIntA 1292->1298 1294 419353-419358 1293->1294 1295 41935a 1293->1295 1297 41935f-41936a call 40535d 1294->1297 1295->1297 1303 419340-419343 call 401fb8 1298->1303 1304 419334-41933d call 41accf 1298->1304 1303->1293 1304->1303
                            APIs
                              • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F34
                              • Part of subcall function 00419F23: IsWow64Process.KERNEL32(00000000,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F3B
                              • Part of subcall function 00411F91: RegOpenKeyExA.KERNELBASE(80000002,00000400,00000000,00020019,?), ref: 00411FB5
                              • Part of subcall function 00411F91: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00411FD2
                              • Part of subcall function 00411F91: RegCloseKey.KERNELBASE(?), ref: 00411FDD
                            • StrToIntA.SHLWAPI(00000000,00469710,00000000,00000000,00000000,00471FFC,00000001,?,?,?,?,?,?,0040D6A0), ref: 00419327
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Process$CloseCurrentOpenQueryValueWow64
                            • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                            • API String ID: 782494840-2070987746
                            • Opcode ID: 608e57619489d21891a1eb0faef3e3de2e5d7cfc4d3d4ac4db92d5b518af806a
                            • Instruction ID: a9b62d1d1389f8d2b696bc63f2982e792167bed2dd8bed00043a633dd184e9c5
                            • Opcode Fuzzy Hash: 608e57619489d21891a1eb0faef3e3de2e5d7cfc4d3d4ac4db92d5b518af806a
                            • Instruction Fuzzy Hash: E411E371A002456AC704B765CC67AAF761D8B54309F64053FF905A71E2FABC4D8282AA

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1308 40966d-40967d 1309 409683-409685 1308->1309 1310 40971a-40971d 1308->1310 1311 409688-4096ae call 401ee4 CreateFileW 1309->1311 1314 4096b0-4096be GetFileSize 1311->1314 1315 4096ee 1311->1315 1317 4096c0 1314->1317 1318 4096e5-4096ec CloseHandle 1314->1318 1316 4096f1-4096f5 1315->1316 1316->1311 1319 4096f7-4096fa 1316->1319 1320 4096c2-4096c8 1317->1320 1321 4096ca-4096d1 1317->1321 1318->1316 1319->1310 1322 4096fc-409703 1319->1322 1320->1318 1320->1321 1323 4096d3-4096d5 call 40a025 1321->1323 1324 4096da-4096df Sleep 1321->1324 1322->1310 1325 409705-409715 call 408098 call 409203 1322->1325 1323->1324 1324->1318 1325->1310
                            APIs
                            • CreateFileW.KERNELBASE(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409745), ref: 004096A3
                            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409745), ref: 004096B2
                            • Sleep.KERNEL32(00002710,?,?,?,00409745), ref: 004096DF
                            • CloseHandle.KERNELBASE(00000000,?,?,?,00409745), ref: 004096E6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$CloseCreateHandleSizeSleep
                            • String ID: h G
                            • API String ID: 1958988193-3300504347
                            • Opcode ID: 69967f799420f26f2b02874191ad9bb2a384d5afdd26a511e67be7982d0c8c16
                            • Instruction ID: 1483d32ec36d41576822df3093d1b75ffc22edec2a146082987510034e162158
                            • Opcode Fuzzy Hash: 69967f799420f26f2b02874191ad9bb2a384d5afdd26a511e67be7982d0c8c16
                            • Instruction Fuzzy Hash: 24113D70201380ABD7316B749D99A2F3A9BB746304F44087EF281636D3C67D5C44C32E

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1330 41215f-412176 RegCreateKeyA 1331 412178-4121ad call 40245c call 401f8b RegSetValueExA RegCloseKey 1330->1331 1332 4121af 1330->1332 1334 4121b1-4121bf call 401fb8 1331->1334 1332->1334
                            APIs
                            • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041216E
                            • RegSetValueExA.KERNELBASE(?,00464150,00000000,?,00000000,00000000,00472200,?,pth_unenc,0040E23B,00464150,3.8.0 Pro), ref: 00412196
                            • RegCloseKey.KERNELBASE(?,?,pth_unenc,0040E23B,00464150,3.8.0 Pro), ref: 004121A1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseCreateValue
                            • String ID: XIK$pth_unenc
                            • API String ID: 1818849710-1422026350
                            • Opcode ID: f22ae03cc73ffd9918ec88d2fef4797e03461f2c2f39713df9249136138d9c6b
                            • Instruction ID: 4e2890e51e7d784523b6c6e9c9a916a8daaabc2f4381c7e0ff06ecafce147d70
                            • Opcode Fuzzy Hash: f22ae03cc73ffd9918ec88d2fef4797e03461f2c2f39713df9249136138d9c6b
                            • Instruction Fuzzy Hash: 5AF0F632100208BFCB00EFA0DD45DEE373CEF04751F104226BD09A61A2D7359E10DB94

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1340 41a17b-41a18c 1341 41a1a4-41a1ab 1340->1341 1342 41a18e-41a191 1340->1342 1345 41a1ac-41a1c5 CreateFileW 1341->1345 1343 41a193-41a198 1342->1343 1344 41a19a-41a1a2 1342->1344 1343->1345 1344->1345 1346 41a1c7-41a1c9 1345->1346 1347 41a1cb-41a1d0 1345->1347 1348 41a209-41a20e 1346->1348 1349 41a1d2-41a1e0 SetFilePointer 1347->1349 1350 41a1eb-41a1fc WriteFile 1347->1350 1349->1350 1353 41a1e2-41a1e9 CloseHandle 1349->1353 1351 41a200-41a207 CloseHandle 1350->1351 1352 41a1fe 1350->1352 1351->1348 1352->1351 1353->1346
                            APIs
                            • CreateFileW.KERNELBASE(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0041A29A,00000000,00000000,?), ref: 0041A1BA
                            • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000002,?,004098DF,?,00000000,00000000), ref: 0041A1D7
                            • CloseHandle.KERNEL32(00000000,?,004098DF,?,00000000,00000000), ref: 0041A1E3
                            • WriteFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,?,004098DF,?,00000000,00000000), ref: 0041A1F4
                            • CloseHandle.KERNELBASE(00000000,?,004098DF,?,00000000,00000000), ref: 0041A201
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$CloseHandle$CreatePointerWrite
                            • String ID:
                            • API String ID: 1852769593-0
                            • Opcode ID: 900e91da6aef5ae1ef2d64e2906a14ebfc53969b27a9c650ee74425d8e4f4bd5
                            • Instruction ID: 9d85e8900f1be3931a26f88ae5ac80d5e45035a8363d546858a313564ae31bc3
                            • Opcode Fuzzy Hash: 900e91da6aef5ae1ef2d64e2906a14ebfc53969b27a9c650ee74425d8e4f4bd5
                            • Instruction Fuzzy Hash: 0911C4712062147FE6105A249C88EFB779CEB46375F10076AF556C32D1C6698C95863B

                            Control-flow Graph

                            APIs
                            • CreateThread.KERNELBASE(00000000,00000000,00409305,?,00000000,00000000), ref: 0040928B
                            • CreateThread.KERNELBASE(00000000,00000000,004092EF,?,00000000,00000000), ref: 0040929B
                            • CreateThread.KERNELBASE(00000000,00000000,Function_00009311,?,00000000,00000000), ref: 004092A7
                              • Part of subcall function 0040A0B0: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A0BE
                              • Part of subcall function 0040A0B0: wsprintfW.USER32 ref: 0040A13F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CreateThread$LocalTimewsprintf
                            • String ID: Offline Keylogger Started
                            • API String ID: 465354869-4114347211
                            • Opcode ID: 6be413687ec7e6cf8a6aae081c0db350f6bf135ed0b5d0c64268afb77a753199
                            • Instruction ID: c8e77f7b3f84bd49b91c3d3ae4e8ac846fef78eef7351f53fb2416b9cb49ddb0
                            • Opcode Fuzzy Hash: 6be413687ec7e6cf8a6aae081c0db350f6bf135ed0b5d0c64268afb77a753199
                            • Instruction Fuzzy Hash: 3211A7A15003083ED210BB669DD6CBB7A5CDA8139CB40057FF845221C3EAB85D19C6FF

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1376 411f34-411f5c RegOpenKeyExA 1377 411f8b 1376->1377 1378 411f5e-411f89 RegQueryValueExA RegCloseKey 1376->1378 1379 411f8d-411f90 1377->1379 1378->1379
                            APIs
                            • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 00411F54
                            • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,00472200), ref: 00411F72
                            • RegCloseKey.KERNELBASE(?), ref: 00411F7D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseOpenQueryValue
                            • String ID: pth_unenc
                            • API String ID: 3677997916-4028850238
                            • Opcode ID: 57758b6d0601c7ca4cdc37a1c8378ac71baf4d5830b0c502524eb489cf77768e
                            • Instruction ID: 6ec0a72befc52f1c009cc632a5b728b25634ffaa8485c37bac66e7b8b5c78dc5
                            • Opcode Fuzzy Hash: 57758b6d0601c7ca4cdc37a1c8378ac71baf4d5830b0c502524eb489cf77768e
                            • Instruction Fuzzy Hash: 31F01D7694020CBFDF109FA09C45FEE7BBCEB04B11F1041A5BA04E6191D2359A54DB94
                            APIs
                            • RegOpenKeyExA.KERNELBASE(80000002,00000400,00000000,00020019,?), ref: 00411FB5
                            • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00411FD2
                            • RegCloseKey.KERNELBASE(?), ref: 00411FDD
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseOpenQueryValue
                            • String ID:
                            • API String ID: 3677997916-0
                            • Opcode ID: 7a1544548b3f7c2bdbc79f0242f37fe977c23e2c99779a8425445d9686f74cb1
                            • Instruction ID: 7c5a36a74d232ee299d7294234303f181ef10811f7d8c913f13e4634b011a18e
                            • Opcode Fuzzy Hash: 7a1544548b3f7c2bdbc79f0242f37fe977c23e2c99779a8425445d9686f74cb1
                            • Instruction Fuzzy Hash: 2D01D676900218BBCB209B95DD08DEF7F7DDB84751F000166BB05A3150DB748E46D7B8
                            APIs
                            • _wcslen.LIBCMT ref: 00408F39
                              • Part of subcall function 00409203: CreateThread.KERNELBASE(00000000,00000000,00409305,?,00000000,00000000), ref: 0040928B
                              • Part of subcall function 00409203: CreateThread.KERNELBASE(00000000,00000000,004092EF,?,00000000,00000000), ref: 0040929B
                              • Part of subcall function 00409203: CreateThread.KERNELBASE(00000000,00000000,Function_00009311,?,00000000,00000000), ref: 004092A7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CreateThread$_wcslen
                            • String ID: heL
                            • API String ID: 1119755333-3731214803
                            • Opcode ID: 645e63c643fe541982be9c38fbafdef83d5bd0d0989aba128bc5a6be231db3ff
                            • Instruction ID: bde1965b6f08766bd400bb9d626b3f4fd5e121562736213e95ba31f4244dc5e2
                            • Opcode Fuzzy Hash: 645e63c643fe541982be9c38fbafdef83d5bd0d0989aba128bc5a6be231db3ff
                            • Instruction Fuzzy Hash: 86218F719040899ACB09FFB5DD528EE7BB5AE51308F00003FF941722E2DE785A49DA99
                            APIs
                            • RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: AllocateHeap
                            • String ID: P@
                            • API String ID: 1279760036-676759640
                            • Opcode ID: 0c61ffa0ec78c269e0422769366e0108c3b164e239eff4ad14a217a7d57edf52
                            • Instruction ID: 99ef05a6bb91785527f59a1062444bc3c705daae6acf277761014d7f2c467fed
                            • Opcode Fuzzy Hash: 0c61ffa0ec78c269e0422769366e0108c3b164e239eff4ad14a217a7d57edf52
                            • Instruction Fuzzy Hash: 7EE0E52110162377F6312E635C0075B36489F41BA2F17412BFC8596780CB69CE0041AD
                            APIs
                            • _free.LIBCMT ref: 004436B8
                              • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                            • RtlReAllocateHeap.NTDLL(00000000,00000000,?,?,0000000F,00000000,00430CB7,00000000,0000000F,0042D6C1,?,?,0042F768,?,?,00000000), ref: 004436F4
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: AllocateHeap$_free
                            • String ID:
                            • API String ID: 1482568997-0
                            • Opcode ID: e0f464859dd348f1fcd6b7cf27edbe1d1103636ea8f71a568145896bc952c0a8
                            • Instruction ID: 1ca59af56198d509cf9e402e21e9c8c5a276ccba14ddaf673a50935c82dc1d11
                            • Opcode Fuzzy Hash: e0f464859dd348f1fcd6b7cf27edbe1d1103636ea8f71a568145896bc952c0a8
                            • Instruction Fuzzy Hash: F0F062322012177AFB312E27AC05A6B37599F81F77F23412BF954A6391EA3CDA01456E
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f210c679e2b780eded3ea4ef50917041f60fa4d2abe52b8749c2b449606446f0
                            • Instruction ID: 17b6f17919427e724365abd55f1db4a6b8769e1fa76fb76fe63095c9ff18be87
                            • Opcode Fuzzy Hash: f210c679e2b780eded3ea4ef50917041f60fa4d2abe52b8749c2b449606446f0
                            • Instruction Fuzzy Hash: 09F0ECB02042015BCB1C9B34CD5062B379A4BA8365F289F7FF02BD61E0C73AC895860D
                            APIs
                            • getaddrinfo.WS2_32(00000000,00000000,00000000,0046FACC,00471FFC,00000000,00413BDE,00000000,00000001), ref: 00413961
                            • WSASetLastError.WS2_32(00000000), ref: 00413966
                              • Part of subcall function 004137DC: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0041382B
                              • Part of subcall function 004137DC: LoadLibraryA.KERNEL32(?), ref: 0041386D
                              • Part of subcall function 004137DC: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 0041388D
                              • Part of subcall function 004137DC: FreeLibrary.KERNEL32(00000000), ref: 00413894
                              • Part of subcall function 004137DC: LoadLibraryA.KERNEL32(?), ref: 004138CC
                              • Part of subcall function 004137DC: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 004138DE
                              • Part of subcall function 004137DC: FreeLibrary.KERNEL32(00000000), ref: 004138E5
                              • Part of subcall function 004137DC: GetProcAddress.KERNEL32(00000000,?), ref: 004138F4
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                            • String ID:
                            • API String ID: 1170566393-0
                            • Opcode ID: 446cd1a75fef60d2dbb194a89db87c245147481f39af62d49fc0052fbde1f552
                            • Instruction ID: 06324504dbe977c901379e35fefec32dabdef79d564ed510376fbe661015aea4
                            • Opcode Fuzzy Hash: 446cd1a75fef60d2dbb194a89db87c245147481f39af62d49fc0052fbde1f552
                            • Instruction Fuzzy Hash: FFD02B723001213B9310AB5DAC01FB76B9CDFD27227050037F409C3110D7948D4147AD
                            APIs
                            • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404E9A
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Event
                            • String ID:
                            • API String ID: 4201588131-0
                            • Opcode ID: f707382b18fa39c0527187131c55234197c0fa46854763e90b09e39a9568e99a
                            • Instruction ID: b890c501aeabc943cf782ca315c2c368517b908ebe77e8074f52597b82095e9a
                            • Opcode Fuzzy Hash: f707382b18fa39c0527187131c55234197c0fa46854763e90b09e39a9568e99a
                            • Instruction Fuzzy Hash: 1B212C71000B009FDB216B26DC49B17BBE5FF40326F114A2DE2E212AF1CB79E851DB58
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: send
                            • String ID:
                            • API String ID: 2809346765-0
                            • Opcode ID: 01e24c4520a6d3c4395155137d096ef59c3bb50acc7407598b25046a660799bf
                            • Instruction ID: 7b6f63586de962cf13c642be8f044126cb3c52731424b67aaf056de8313b57d0
                            • Opcode Fuzzy Hash: 01e24c4520a6d3c4395155137d096ef59c3bb50acc7407598b25046a660799bf
                            • Instruction Fuzzy Hash: 41B092B9108302BFCA160B60CC0887A7EA6ABC8786B00882CF546421B0C636C460AB2A
                            APIs
                            • GetCurrentProcessId.KERNEL32 ref: 00410B6B
                              • Part of subcall function 00412268: RegCreateKeyA.ADVAPI32(80000001,00000000,P0F), ref: 00412276
                              • Part of subcall function 00412268: RegSetValueExA.ADVAPI32(P0F,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 00412291
                              • Part of subcall function 00412268: RegCloseKey.ADVAPI32(?,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 0041229C
                            • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00410BAB
                            • CloseHandle.KERNEL32(00000000), ref: 00410BBA
                            • CreateThread.KERNEL32(00000000,00000000,00411253,00000000,00000000,00000000), ref: 00410C10
                            • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00410E7F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                            • String ID: (#G$Remcos restarted by watchdog!$T/F$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$XIK$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                            • API String ID: 3018269243-3990414578
                            • Opcode ID: 908fc272b5723e6b4bc44a390cf485c244507a308f256cd89e505a4f0aa7388b
                            • Instruction ID: e4f63523a9081b51a3adb9d06d528b7104d503695ba60a117a14e5ebfa22ea95
                            • Opcode Fuzzy Hash: 908fc272b5723e6b4bc44a390cf485c244507a308f256cd89e505a4f0aa7388b
                            • Instruction Fuzzy Hash: DD71923160430167C604FB62DD67DAE73A8AE91308F50097FF546621E2EEBC9E49C69F
                            APIs
                            • SetEvent.KERNEL32(?,?), ref: 00406D4A
                            • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00406E18
                            • DeleteFileW.KERNEL32(00000000), ref: 00406E3A
                              • Part of subcall function 0041A01B: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00472200,00000001), ref: 0041A076
                              • Part of subcall function 0041A01B: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,00472200,00000001), ref: 0041A0A6
                              • Part of subcall function 0041A01B: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,00472200,00000001), ref: 0041A0FB
                              • Part of subcall function 0041A01B: FindClose.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A15C
                              • Part of subcall function 0041A01B: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A163
                              • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                            • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00407228
                            • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 00407309
                            • DeleteFileA.KERNEL32(?), ref: 0040768E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$Find$DeleteDirectoryRemove$AttributesCloseDriveEventExecuteFirstLocalLogicalNextShellStringsTime
                            • String ID: Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $T/F$Unable to delete: $Unable to rename file!$open
                            • API String ID: 3077191444-2050282093
                            • Opcode ID: aee6b6d5881b43ab65cdf8db1b65e2fac192666ab120838c74a2435cfa28b11a
                            • Instruction ID: 48d75f04ed6415a86b5419c4bbb4b80b443badeb9edbc79095c7941e671ccbd4
                            • Opcode Fuzzy Hash: aee6b6d5881b43ab65cdf8db1b65e2fac192666ab120838c74a2435cfa28b11a
                            • Instruction Fuzzy Hash: EE42A771A043005BC604FB76C86B9AE77A9AF91304F40493FF542671E2EE7D9A09C79B
                            APIs
                            • __Init_thread_footer.LIBCMT ref: 004056C6
                            • __Init_thread_footer.LIBCMT ref: 00405703
                            • CreatePipe.KERNEL32(00473BB4,00473B9C,00473AC0,00000000,00463068,00000000), ref: 00405796
                            • CreatePipe.KERNEL32(00473BA0,00473BBC,00473AC0,00000000), ref: 004057AC
                            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00473AD0,00473BA4), ref: 0040581F
                            • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405877
                            • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0040589C
                            • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058C9
                              • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                            • WriteFile.KERNEL32(00000000,00000000,?,00000000,00471F28,0046306C,00000062,00463050), ref: 004059C4
                            • Sleep.KERNEL32(00000064,00000062,00463050), ref: 004059DE
                            • TerminateProcess.KERNEL32(00000000), ref: 004059F7
                            • CloseHandle.KERNEL32 ref: 00405A03
                            • CloseHandle.KERNEL32 ref: 00405A0B
                            • CloseHandle.KERNEL32 ref: 00405A1D
                            • CloseHandle.KERNEL32 ref: 00405A25
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexit
                            • String ID: SystemDrive$cmd.exe
                            • API String ID: 618029711-3633465311
                            • Opcode ID: 11ef208190f28464eeb25ff11df0b0ca1f62258f18b6d014a2121a6f039f8295
                            • Instruction ID: 60b94bd4732a7a61eda53217d638a5a8398e5d64ba0573e0a23605d008395794
                            • Opcode Fuzzy Hash: 11ef208190f28464eeb25ff11df0b0ca1f62258f18b6d014a2121a6f039f8295
                            • Instruction Fuzzy Hash: 2991D571600204AFC710BF65AC52D6F3698EB44745F00443FF949A72E3DA7CAE489B6E
                            APIs
                            • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040AAF0
                            • FindClose.KERNEL32(00000000), ref: 0040AB0A
                            • FindNextFileA.KERNEL32(00000000,?), ref: 0040AC2D
                            • FindClose.KERNEL32(00000000), ref: 0040AC53
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Find$CloseFile$FirstNext
                            • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                            • API String ID: 1164774033-3681987949
                            • Opcode ID: 073fac6c51c1e751163950d4b7c16a7b92d8ae4f100ca626a4fd65d43b926aa3
                            • Instruction ID: fcfcc6101c27069c9b98dcbc284c26b589152974821445ccf2a2d41a2abcc6ea
                            • Opcode Fuzzy Hash: 073fac6c51c1e751163950d4b7c16a7b92d8ae4f100ca626a4fd65d43b926aa3
                            • Instruction Fuzzy Hash: DD516C7190021A9ADB14FBB1DC96EEEB738AF10309F50057FF406720E2FF785A458A5A
                            APIs
                            • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040ACF0
                            • FindClose.KERNEL32(00000000), ref: 0040AD0A
                            • FindNextFileA.KERNEL32(00000000,?), ref: 0040ADCA
                            • FindClose.KERNEL32(00000000), ref: 0040ADF0
                            • FindClose.KERNEL32(00000000), ref: 0040AE11
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Find$Close$File$FirstNext
                            • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                            • API String ID: 3527384056-432212279
                            • Opcode ID: 0bc79713efeab2056573a716af7b519b91b9c0107f61c6b9dd4d47a89dc72595
                            • Instruction ID: fb37dd61a783c7e48c67abb1194b5e9e6d585cff7aa156a37ad31c809035e36e
                            • Opcode Fuzzy Hash: 0bc79713efeab2056573a716af7b519b91b9c0107f61c6b9dd4d47a89dc72595
                            • Instruction Fuzzy Hash: 33417E7190021A5ACB14FBB1DC56DEEB729AF11306F50057FF402B21D2EF789A468A9E
                            APIs
                            • OpenClipboard.USER32 ref: 00414EC2
                            • EmptyClipboard.USER32 ref: 00414ED0
                            • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 00414EF0
                            • GlobalLock.KERNEL32(00000000), ref: 00414EF9
                            • GlobalUnlock.KERNEL32(00000000), ref: 00414F2F
                            • SetClipboardData.USER32(0000000D,00000000), ref: 00414F38
                            • CloseClipboard.USER32 ref: 00414F55
                            • OpenClipboard.USER32 ref: 00414F5C
                            • GetClipboardData.USER32(0000000D), ref: 00414F6C
                            • GlobalLock.KERNEL32(00000000), ref: 00414F75
                            • GlobalUnlock.KERNEL32(00000000), ref: 00414F7E
                            • CloseClipboard.USER32 ref: 00414F84
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmpty
                            • String ID:
                            • API String ID: 2339235153-0
                            • Opcode ID: 24dbaecf5958898eef352da2c3f6a507803554f71b0ebfcaee2d4e9ceda806f0
                            • Instruction ID: 88f859f6ed4527f0268ca0f0dcff7fecf11b3a85ebb64268ee3e6238e9d0ca75
                            • Opcode Fuzzy Hash: 24dbaecf5958898eef352da2c3f6a507803554f71b0ebfcaee2d4e9ceda806f0
                            • Instruction Fuzzy Hash: C32162312043009BD714BF71DC5A9BE76A8AF90746F81093EF906931E3EF3889458A6A
                            APIs
                            • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00472200,00000001), ref: 0041A076
                            • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,00472200,00000001), ref: 0041A0A6
                            • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,00472200,00000001), ref: 0041A118
                            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,00472200,00000001), ref: 0041A125
                              • Part of subcall function 0041A01B: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,00472200,00000001), ref: 0041A0FB
                            • GetLastError.KERNEL32(?,?,?,?,?,?,00472200,00000001), ref: 0041A146
                            • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A15C
                            • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A163
                            • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A16C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                            • String ID: pth_unenc
                            • API String ID: 2341273852-4028850238
                            • Opcode ID: 6646849479acfbb23c7f6e30dece2f39408b91799c0e2f504d1e8212b579ce47
                            • Instruction ID: c5fafce0dbccb0860899da49af80cd87a4a733faaf08891c553187227cdc222a
                            • Opcode Fuzzy Hash: 6646849479acfbb23c7f6e30dece2f39408b91799c0e2f504d1e8212b579ce47
                            • Instruction Fuzzy Hash: 5F31937290121C6ADB20EBA0DC49EDB77BCAB08305F4406FBF558D3152EB39DAD48A19
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: 0$1$2$3$4$5$6$7
                            • API String ID: 0-3177665633
                            • Opcode ID: a8d0df93e5f8a066e7b011b6a1d3a7de81d979cc05f74ce077101d6e7286cc23
                            • Instruction ID: 7e6592d3055df16b324e67483fbf58bd1f951358f7384255f7d9d01b5e43b049
                            • Opcode Fuzzy Hash: a8d0df93e5f8a066e7b011b6a1d3a7de81d979cc05f74ce077101d6e7286cc23
                            • Instruction Fuzzy Hash: 7661D4709183019ED704EF21D8A1FAB7BB4DF94310F10881FF5A25B2D1DA789A49CBA6
                            APIs
                            • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004727F8), ref: 00418714
                            • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00418763
                            • GetLastError.KERNEL32 ref: 00418771
                            • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 004187A9
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: EnumServicesStatus$ErrorLastManagerOpen
                            • String ID:
                            • API String ID: 3587775597-0
                            • Opcode ID: 81e72d1dcc13280ed1879cf9f090714b21071ed40770cb220e29a79454c2b8af
                            • Instruction ID: 6ce88c058296d2c3b0169cbae3b24baff62e3479be35c2318cb4853598c639b3
                            • Opcode Fuzzy Hash: 81e72d1dcc13280ed1879cf9f090714b21071ed40770cb220e29a79454c2b8af
                            • Instruction Fuzzy Hash: 04814071104344ABC304FB62DC959AFB7E8FF94708F50092EF58552192EE78EA49CB9A
                            APIs
                            • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040B2DC
                            • FindNextFileW.KERNEL32(00000000,?), ref: 0040B3AF
                            • FindClose.KERNEL32(00000000), ref: 0040B3BE
                            • FindClose.KERNEL32(00000000), ref: 0040B3E9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Find$CloseFile$FirstNext
                            • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                            • API String ID: 1164774033-405221262
                            • Opcode ID: 904f1dcb39413fb3e64fbfd683be743ae3b970db512ed81324753e420e24cf76
                            • Instruction ID: 883258bb694cc85cc249d311a8318fbda55549897f82b44e5d780b3967986c9e
                            • Opcode Fuzzy Hash: 904f1dcb39413fb3e64fbfd683be743ae3b970db512ed81324753e420e24cf76
                            • Instruction Fuzzy Hash: 7D31533190025996CB14FBA1DC9ADEE7778AF50718F10017FF405B21D2EFBC9A4A8A8D
                            APIs
                            • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004129B8
                            • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004129C4
                            • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 00412CBA
                            • GetProcAddress.KERNEL32(00000000), ref: 00412CC1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: AddressCloseCreateLibraryLoadProc
                            • String ID: SHDeleteKeyW$Shlwapi.dll
                            • API String ID: 1563625733-314212984
                            • Opcode ID: 539000715cd75b1513549ebdfc505d3174fa0dad8bf9deee43d3060975f75ffd
                            • Instruction ID: 16181ac17c5890234a95f9c719cc05f83ad3eef33587bd03cd2ae8bf1541d7ce
                            • Opcode Fuzzy Hash: 539000715cd75b1513549ebdfc505d3174fa0dad8bf9deee43d3060975f75ffd
                            • Instruction Fuzzy Hash: CCE1DA72A0430067CA14B776DD57DAF36A8AF91318F40053FF946F71E2EDBD8A44829A
                            APIs
                            • _free.LIBCMT ref: 00446741
                            • _free.LIBCMT ref: 00446765
                            • _free.LIBCMT ref: 004468EC
                            • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045C1E4), ref: 004468FE
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F754,000000FF,00000000,0000003F,00000000,?,?), ref: 00446976
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F7A8,000000FF,?,0000003F,00000000,?), ref: 004469A3
                            • _free.LIBCMT ref: 00446AB8
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$ByteCharMultiWide$InformationTimeZone
                            • String ID:
                            • API String ID: 314583886-0
                            • Opcode ID: 590fbe6c883195065d8f41959e79684f6a62ba53d6f2d73b1c2b9b1522ea5693
                            • Instruction ID: 8b87e38212d70e432f0d45c21c10c2da0ad9042405ab808e013634feac4ff008
                            • Opcode Fuzzy Hash: 590fbe6c883195065d8f41959e79684f6a62ba53d6f2d73b1c2b9b1522ea5693
                            • Instruction Fuzzy Hash: 67C15CB1900245ABFB24AF79DC41AAA7BB8EF03314F16416FE48497341EB788E45C75E
                            APIs
                              • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F34
                              • Part of subcall function 00419F23: IsWow64Process.KERNEL32(00000000,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F3B
                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E305
                            • Process32FirstW.KERNEL32(00000000,?), ref: 0040E329
                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E338
                            • CloseHandle.KERNEL32(00000000), ref: 0040E4EF
                              • Part of subcall function 00419F51: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040DFB9,00000000,?,?,00000001), ref: 00419F66
                              • Part of subcall function 00419F51: IsWow64Process.KERNEL32(00000000,?,?,?,00000001), ref: 00419F71
                              • Part of subcall function 00419F87: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000), ref: 00419F9C
                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E4E0
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Process$Process32$NextOpenWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                            • String ID: XAF
                            • API String ID: 44284711-3946003707
                            • Opcode ID: 10e09a5262f9a08aa7f6686e6d96ff6ebaa430870317561c706418e7a2d68b5e
                            • Instruction ID: 9ef93eb2fb75da2762b4731e21c5b8dc01158be40bd3d18dbb98703d8f1b3e60
                            • Opcode Fuzzy Hash: 10e09a5262f9a08aa7f6686e6d96ff6ebaa430870317561c706418e7a2d68b5e
                            • Instruction Fuzzy Hash: 904101311082415BC365F761D991EEFB3A8AFD4344F50493EF48A921E2EF38994AC75A
                            APIs
                            • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040A98F
                            • GetLastError.KERNEL32 ref: 0040A999
                            Strings
                            • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040A95A
                            • UserProfile, xrefs: 0040A95F
                            • [Chrome StoredLogins not found], xrefs: 0040A9B3
                            • [Chrome StoredLogins found, cleared!], xrefs: 0040A9BF
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: DeleteErrorFileLast
                            • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                            • API String ID: 2018770650-1062637481
                            • Opcode ID: de97d65e3799a6e0596e62218f2c5adfc51664b458c632a8240d65e96125f996
                            • Instruction ID: b2134abed7c3f614b53a5a28bf05479c5c2a11b403a78876888f6ce5fd1f590e
                            • Opcode Fuzzy Hash: de97d65e3799a6e0596e62218f2c5adfc51664b458c632a8240d65e96125f996
                            • Instruction Fuzzy Hash: 7801F271B9020466CA047A75DC2B8BE7728A921304B90057FF402732E2FE7D8A1586CF
                            APIs
                            • GetCurrentProcess.KERNEL32(00000028,?), ref: 00415C9D
                            • OpenProcessToken.ADVAPI32(00000000), ref: 00415CA4
                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00415CB6
                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00415CD5
                            • GetLastError.KERNEL32 ref: 00415CDB
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                            • String ID: SeShutdownPrivilege
                            • API String ID: 3534403312-3733053543
                            • Opcode ID: 6b6a245ea7d04d36a7da703741a32f9ec851e6ff0cbdb80aef66d6ce6c3f9121
                            • Instruction ID: ffc0972e6e84a8b4c82c7ff824774f91a9d221977230a9de1ecf93d0fe8dbf87
                            • Opcode Fuzzy Hash: 6b6a245ea7d04d36a7da703741a32f9ec851e6ff0cbdb80aef66d6ce6c3f9121
                            • Instruction Fuzzy Hash: 0AF03A71901229ABDB10ABA1ED4DEEF7F7CEF05616F510060B805A2152D6749A04CAB5
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: __floor_pentium4
                            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                            • API String ID: 4168288129-2761157908
                            • Opcode ID: 424f1fdb70b95b31cd56a309ba639d17bbd544cf86ca0e3e73dfbfbd66e38c04
                            • Instruction ID: 053c4da9c4e9401cc5e8c6747fb67a0461d28ab3294dbb24078e68a968df4fbd
                            • Opcode Fuzzy Hash: 424f1fdb70b95b31cd56a309ba639d17bbd544cf86ca0e3e73dfbfbd66e38c04
                            • Instruction Fuzzy Hash: 74C26D71E046288FDB25CE28DD407EAB3B5EB45306F1441EBD80DE7252E778AE898F45
                            APIs
                            • __EH_prolog.LIBCMT ref: 00408393
                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040842F
                            • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0040848D
                            • FindNextFileW.KERNEL32(00000000,?), ref: 004084E5
                            • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 004084FC
                            • FindClose.KERNEL32(00000000), ref: 004086F4
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Find$CloseFile$Exception@8FirstH_prologNextThrow
                            • String ID:
                            • API String ID: 242384754-0
                            • Opcode ID: 55d340394a1e946826e35113a81676ff2ee5d48cfe2b997bde428ffadc6ea4c0
                            • Instruction ID: 071b26812b5e49f88d0361c7bacc9152bfce797c8686ce15524b94070306fde2
                            • Opcode Fuzzy Hash: 55d340394a1e946826e35113a81676ff2ee5d48cfe2b997bde428ffadc6ea4c0
                            • Instruction Fuzzy Hash: 4FB18D329001099BCB14FBA1CD92AEDB378AF50318F50416FE506B71E2EF785B49CB98
                            APIs
                              • Part of subcall function 00410201: SetLastError.KERNEL32(0000000D,00410781,00000000,?,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 00410207
                            • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 0041079C
                            • GetNativeSystemInfo.KERNEL32(?,0040BE60,00000000,?,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 0041080A
                            • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 0041082E
                              • Part of subcall function 00410708: VirtualAlloc.KERNEL32(00000004,00000004,00000004,00000004,0041084C,?,00000000,00003000,00000004,00000000,?,?), ref: 00410718
                            • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00410875
                            • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 0041087C
                            • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041098F
                              • Part of subcall function 00410ADC: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,0041099C,?,?,?,?,?), ref: 00410B4C
                              • Part of subcall function 00410ADC: HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 00410B53
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                            • String ID:
                            • API String ID: 3950776272-0
                            • Opcode ID: 97c9471a4feb21372bfec3f691305eac3cca21be586dff8f661e5b3b360a5f75
                            • Instruction ID: 59628d97446cb481dba570c2b442d682f024dd9dc2812234181a156a821a4c1f
                            • Opcode Fuzzy Hash: 97c9471a4feb21372bfec3f691305eac3cca21be586dff8f661e5b3b360a5f75
                            • Instruction Fuzzy Hash: F7619270200211ABD750AF66CD91BAB7BA5BF44714F54412AF9158B382DBFCE8C1CBD9
                            APIs
                            • GetForegroundWindow.USER32(00472008,?,00472008), ref: 0040949C
                            • GetWindowThreadProcessId.USER32(00000000,?), ref: 004094A7
                            • GetKeyboardLayout.USER32(00000000), ref: 004094AE
                            • GetKeyState.USER32(00000010), ref: 004094B8
                            • GetKeyboardState.USER32(?), ref: 004094C5
                            • ToUnicodeEx.USER32(00000000,00000000,?,?,00000010,00000000,00000000), ref: 004094E1
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: KeyboardStateWindow$ForegroundLayoutProcessThreadUnicode
                            • String ID:
                            • API String ID: 3566172867-0
                            • Opcode ID: fb31a49d7b713d020a20d08ecca38714848a3f936d0bc64d24338e42dde13448
                            • Instruction ID: c7d3d650b917c490fc12d3d20248521073b1bf92526e1b13c177c4272b1ff9cc
                            • Opcode Fuzzy Hash: fb31a49d7b713d020a20d08ecca38714848a3f936d0bc64d24338e42dde13448
                            • Instruction Fuzzy Hash: B9111E7290020CABDB10DBE4EC49FDA7BBCEB4C706F510465FA08E7191E675EA548BA4
                            APIs
                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,00418656,00000000), ref: 00418A09
                            • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,00418656,00000000), ref: 00418A1E
                            • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A2B
                            • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,00418656,00000000), ref: 00418A36
                            • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A48
                            • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A4B
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Service$CloseHandle$Open$ManagerStart
                            • String ID:
                            • API String ID: 276877138-0
                            • Opcode ID: 0bca7e064012bf7647cb0938be93fbdbcf9017c0a1d18544c828a485767229c1
                            • Instruction ID: d7e7041197745ae6b8576ac0eea0d71e7d0897d816d6b6e74118e31fa9ec717f
                            • Opcode Fuzzy Hash: 0bca7e064012bf7647cb0938be93fbdbcf9017c0a1d18544c828a485767229c1
                            • Instruction Fuzzy Hash: CAF082711012246FD211EB65EC89DBF2BACDF85BA6B41042BF801931918F78CD49A9B9
                            APIs
                            • FindFirstFileW.KERNEL32(00000000,?), ref: 00417D01
                            • FindNextFileW.KERNEL32(00000000,?,?), ref: 00417DCD
                              • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$Find$CreateFirstNext
                            • String ID: H"G$`'G$`'G
                            • API String ID: 341183262-2774397156
                            • Opcode ID: e4fa129f6cb8288a4327750ab770de081b7811cdbc8239d46e436bd79b808cd9
                            • Instruction ID: cc65440c5fe1593426504ff8613f72b7370ef7481f3bf724e026da4e35a467e2
                            • Opcode Fuzzy Hash: e4fa129f6cb8288a4327750ab770de081b7811cdbc8239d46e436bd79b808cd9
                            • Instruction Fuzzy Hash: 138183315083415BC314FB62C996DEFB7A8AF90304F40493FF586671E2EF789A49C69A
                            APIs
                              • Part of subcall function 00415C90: GetCurrentProcess.KERNEL32(00000028,?), ref: 00415C9D
                              • Part of subcall function 00415C90: OpenProcessToken.ADVAPI32(00000000), ref: 00415CA4
                              • Part of subcall function 00415C90: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00415CB6
                              • Part of subcall function 00415C90: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00415CD5
                              • Part of subcall function 00415C90: GetLastError.KERNEL32 ref: 00415CDB
                            • ExitWindowsEx.USER32(00000000,00000001), ref: 00414E56
                            • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 00414E6B
                            • GetProcAddress.KERNEL32(00000000), ref: 00414E72
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                            • String ID: PowrProf.dll$SetSuspendState
                            • API String ID: 1589313981-1420736420
                            • Opcode ID: 26b14eece71e4d13eaab4e965927ec332996d302ea5694147255bd3539dff505
                            • Instruction ID: 748c18e79ee5f9a1fbb6f05bd7ad52209f91b0004c4d1b0055552a3b76c5c1f9
                            • Opcode Fuzzy Hash: 26b14eece71e4d13eaab4e965927ec332996d302ea5694147255bd3539dff505
                            • Instruction Fuzzy Hash: 5F214F7070430157CE14FBB19896AAF6359AFD4349F40097FB5026B2D2EE7DCC4986AE
                            APIs
                            • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,0044F93B,?,00000000), ref: 0044F6B5
                            • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,0044F93B,?,00000000), ref: 0044F6DE
                            • GetACP.KERNEL32(?,?,0044F93B,?,00000000), ref: 0044F6F3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: InfoLocale
                            • String ID: ACP$OCP
                            • API String ID: 2299586839-711371036
                            • Opcode ID: bf4880e5188eb12a7c294a6f25afa26b03a49e2ed1ffce5823e951fdb7c5b330
                            • Instruction ID: bf1e89585aec8fc6a823a5c6a63220f2d7696aba51182a9853130589b0d37fa4
                            • Opcode Fuzzy Hash: bf4880e5188eb12a7c294a6f25afa26b03a49e2ed1ffce5823e951fdb7c5b330
                            • Instruction Fuzzy Hash: 2221C122A00101A6F7348F24C901A9B73AAAF50B65F578577E809C7221FB36DD4BC398
                            APIs
                            • FindResourceA.KERNEL32(SETTINGS,0000000A), ref: 004194A4
                            • LoadResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194B8
                            • LockResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194BF
                            • SizeofResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194CE
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Resource$FindLoadLockSizeof
                            • String ID: SETTINGS
                            • API String ID: 3473537107-594951305
                            • Opcode ID: 7f61ee72686a272b8f551de58b86ae3e218e906a9fde472ee07ff8038d16bca4
                            • Instruction ID: a9e8191b24fee58836060ebd07e0bd7776b83e69f4e337d8cda710b4f32c44fb
                            • Opcode Fuzzy Hash: 7f61ee72686a272b8f551de58b86ae3e218e906a9fde472ee07ff8038d16bca4
                            • Instruction Fuzzy Hash: 72E01A76200710ABCB211FA1FC5CD273E69F799B537050035FA0183222DA75CC00CA19
                            APIs
                            • __EH_prolog.LIBCMT ref: 004087A5
                            • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0040881D
                            • FindNextFileW.KERNEL32(00000000,?), ref: 00408846
                            • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0040885D
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Find$File$CloseFirstH_prologNext
                            • String ID:
                            • API String ID: 1157919129-0
                            • Opcode ID: 0b2ac7f99fe47f36c40a9f9c4d8826aec965aaee9d198ad93c7cb891ce9d3358
                            • Instruction ID: 37d480644902bd8bd77a9749fd647df5a3db5b19bbca398f696489d34b7b99bb
                            • Opcode Fuzzy Hash: 0b2ac7f99fe47f36c40a9f9c4d8826aec965aaee9d198ad93c7cb891ce9d3358
                            • Instruction Fuzzy Hash: 12814D329001199BCB15EBA1DD929ED73B8AF54308F10427FE446B71E2EF385B49CB98
                            APIs
                              • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                              • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                              • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                              • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                              • Part of subcall function 00445725: _free.LIBCMT ref: 00445784
                              • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 00445791
                            • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0044F8FC
                            • IsValidCodePage.KERNEL32(00000000), ref: 0044F957
                            • IsValidLocale.KERNEL32(?,00000001), ref: 0044F966
                            • GetLocaleInfoW.KERNEL32(?,00001001,00441F7E,00000040,?,0044209E,00000055,00000000,?,?,00000055,00000000), ref: 0044F9AE
                            • GetLocaleInfoW.KERNEL32(?,00001002,00441FFE,00000040), ref: 0044F9CD
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                            • String ID:
                            • API String ID: 745075371-0
                            • Opcode ID: b2004c1cc1df407676deb5a86971a5ed3ade22d67ad87857b151b1318ee5498f
                            • Instruction ID: 3a6be996f1d9ea25600d7609fa1d0555167a50dcc121ad64ff78238f3932635f
                            • Opcode Fuzzy Hash: b2004c1cc1df407676deb5a86971a5ed3ade22d67ad87857b151b1318ee5498f
                            • Instruction Fuzzy Hash: 0351A271900215AFFB20EFA5DC41BBF77B8AF08301F05447BE914EB251E7789A088769
                            APIs
                            • __EH_prolog.LIBCMT ref: 0040784D
                            • FindFirstFileW.KERNEL32(00000000,?,004632A8,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407906
                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040792E
                            • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040793B
                            • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407A51
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                            • String ID:
                            • API String ID: 1771804793-0
                            • Opcode ID: 0c0ef18f2275b3e10c81759ed4882e8cdfc0df5b16c45a42bc3541e3cef5600d
                            • Instruction ID: 4b9324871479917b5af30c26e04a30266e6971a3e86a210f007197118c0b57fe
                            • Opcode Fuzzy Hash: 0c0ef18f2275b3e10c81759ed4882e8cdfc0df5b16c45a42bc3541e3cef5600d
                            • Instruction Fuzzy Hash: 18516372904208AACB04FBA1DD969DD7778AF11308F50417FB846771E2EF389B49CB99
                            APIs
                            • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004064D2
                            • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004065B6
                            Strings
                            • C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, xrefs: 0040651D, 00406645
                            • open, xrefs: 004064CC
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: DownloadExecuteFileShell
                            • String ID: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe$open
                            • API String ID: 2825088817-3615433554
                            • Opcode ID: 63e5868a9e6ed92b4fae7b395335874a333e495a9fa0a9825ed92e96b03d460c
                            • Instruction ID: de45ecf938be0b84f02b1b366aeabb591a3e89dbb22835c7232af05a142efef6
                            • Opcode Fuzzy Hash: 63e5868a9e6ed92b4fae7b395335874a333e495a9fa0a9825ed92e96b03d460c
                            • Instruction Fuzzy Hash: 6F61D331A0430167CA14FB75D8A697E77A99F81708F00093FFD42772D6EE3D8A09869B
                            APIs
                            • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041A861
                              • Part of subcall function 0041215F: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041216E
                              • Part of subcall function 0041215F: RegSetValueExA.KERNELBASE(?,00464150,00000000,?,00000000,00000000,00472200,?,pth_unenc,0040E23B,00464150,3.8.0 Pro), ref: 00412196
                              • Part of subcall function 0041215F: RegCloseKey.KERNELBASE(?,?,pth_unenc,0040E23B,00464150,3.8.0 Pro), ref: 004121A1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseCreateInfoParametersSystemValue
                            • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                            • API String ID: 4127273184-3576401099
                            • Opcode ID: f596ae5af9bf33204b26619baa0d18e1563d856132adf7f8c82eb4cc627f6b2d
                            • Instruction ID: 146807b905f8226e4159dba151db05d0611ea4827dca33b530162433be1e3f9d
                            • Opcode Fuzzy Hash: f596ae5af9bf33204b26619baa0d18e1563d856132adf7f8c82eb4cc627f6b2d
                            • Instruction Fuzzy Hash: 7C119671F8024037D514353A4D6BBAE18199343B50F54016BB6022B6CAF8EE4EA553DF
                            APIs
                            • GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A0BE
                            • wsprintfW.USER32 ref: 0040A13F
                              • Part of subcall function 0040962E: SetEvent.KERNEL32(?,?,?,0040A77B,?,?,?,?,?,00000000), ref: 0040965A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: EventLocalTimewsprintf
                            • String ID: [%04i/%02i/%02i %02i:%02i:%02i $]
                            • API String ID: 1497725170-1359877963
                            • Opcode ID: 41a020b40271810fca9afcffff3f4e02382fdafe0505e2b5479bf2d94888a367
                            • Instruction ID: 6803640c9eec9339f7c785541c6425a10534024a2ea1efda602809c990ee83c1
                            • Opcode Fuzzy Hash: 41a020b40271810fca9afcffff3f4e02382fdafe0505e2b5479bf2d94888a367
                            • Instruction Fuzzy Hash: 5E114272504118AAC708FB96EC558FE77BCEE48315B00412FF806661D2EF7C5A46D6A9
                            APIs
                              • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                              • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                              • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                              • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                            • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00441F85,?,?,?,?,004419DC,?,00000004), ref: 0044EF9A
                            • _wcschr.LIBVCRUNTIME ref: 0044F02A
                            • _wcschr.LIBVCRUNTIME ref: 0044F038
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00441F85,00000000,004420A5), ref: 0044F0DB
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                            • String ID:
                            • API String ID: 4212172061-0
                            • Opcode ID: 2958d0d59106b2716bbf9024854ff4f325b6253e079e5f73fc6a0a954244a96d
                            • Instruction ID: 651119c321e801f17dd1a7ba429a2dceeb4aa1bed9d5f8a21b6634afb1069130
                            • Opcode Fuzzy Hash: 2958d0d59106b2716bbf9024854ff4f325b6253e079e5f73fc6a0a954244a96d
                            • Instruction Fuzzy Hash: 8E61E935600606AAFB24AB36DC46BB773A8FF44714F14047FF905D7282EB78E9488769
                            APIs
                              • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                              • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                              • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                              • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                              • Part of subcall function 00445725: _free.LIBCMT ref: 00445784
                              • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 00445791
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0044F2F7
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0044F348
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0044F408
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorInfoLastLocale$_free$_abort
                            • String ID:
                            • API String ID: 2829624132-0
                            • Opcode ID: 5d155598132bf3b03d9715496123f76655355fd2299683488a64446915391091
                            • Instruction ID: 12c224c4da0c85949021a4ccaa6d586ab513ef91610cb16151a2099a543b2454
                            • Opcode Fuzzy Hash: 5d155598132bf3b03d9715496123f76655355fd2299683488a64446915391091
                            • Instruction Fuzzy Hash: 49617D71600207ABEB289F25CC82B7B77A8EF14314F1041BBED06C6685EB78D949DB58
                            APIs
                            • IsDebuggerPresent.KERNEL32 ref: 004399A4
                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004399AE
                            • UnhandledExceptionFilter.KERNEL32(?), ref: 004399BB
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                            • String ID:
                            • API String ID: 3906539128-0
                            • Opcode ID: 264085c365fd56cdaa9a81dec4e023ddb66b25e6f98bc4556e938571cf163858
                            • Instruction ID: 77e6618fa9d19f9c50586940e2a7469f5a9d54f298177c93e0bbf68cc30459b4
                            • Opcode Fuzzy Hash: 264085c365fd56cdaa9a81dec4e023ddb66b25e6f98bc4556e938571cf163858
                            • Instruction Fuzzy Hash: 1D31D67591122C9BCB21DF65D9897CDB7B8BF08310F5051EAE40CA72A1E7749F858F48
                            APIs
                            • GetCurrentProcess.KERNEL32(?,?,0044078B,?), ref: 004407D6
                            • TerminateProcess.KERNEL32(00000000,?,0044078B,?), ref: 004407DD
                            • ExitProcess.KERNEL32 ref: 004407EF
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Process$CurrentExitTerminate
                            • String ID:
                            • API String ID: 1703294689-0
                            • Opcode ID: ab47e799b5bc4cc6dde358da0dc0a23fd4678ab9e3bf0635ceb4545ab71368f2
                            • Instruction ID: 8c86c1f28e0fd2f6406888839527a8aea1509f7e03a0ffdd8510570f14deced8
                            • Opcode Fuzzy Hash: ab47e799b5bc4cc6dde358da0dc0a23fd4678ab9e3bf0635ceb4545ab71368f2
                            • Instruction Fuzzy Hash: 9AE04631000608ABEF017F20DD48A493B29EB40346F410029F9088B232CB3DED52CA89
                            APIs
                            • OpenClipboard.USER32(00000000), ref: 0040A65D
                            • GetClipboardData.USER32(0000000D), ref: 0040A669
                            • CloseClipboard.USER32 ref: 0040A671
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Clipboard$CloseDataOpen
                            • String ID:
                            • API String ID: 2058664381-0
                            • Opcode ID: 280dd97dd44c7032fc56be9508286d69cfb3c10e1aaf4890c83757bb65daa123
                            • Instruction ID: 184f8b84181a4a50bd43ef3289a1c1a9f5b779335cc527adffbe090e77bee848
                            • Opcode Fuzzy Hash: 280dd97dd44c7032fc56be9508286d69cfb3c10e1aaf4890c83757bb65daa123
                            • Instruction Fuzzy Hash: 6CE08C3064432097D2206F60EC08B8A66649B50B12F064A7AB849AB2D1DA75DC208AAE
                            APIs
                            • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 004329F3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: FeaturePresentProcessor
                            • String ID: P@
                            • API String ID: 2325560087-676759640
                            • Opcode ID: 6bf946e24e0cf3f7143bf6f7c2898541fb51292b7eeb3b4358a3a41aa26ebfb9
                            • Instruction ID: 4a1c44cf8a386737ece403ae0cfd22a47b20ce31fd9c2d8f3958115f99bf9d9d
                            • Opcode Fuzzy Hash: 6bf946e24e0cf3f7143bf6f7c2898541fb51292b7eeb3b4358a3a41aa26ebfb9
                            • Instruction Fuzzy Hash: E4514A719002099BDB24CFAAD98579ABBF4FF48314F14846BD815EB350E3B9A910CFA5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: .
                            • API String ID: 0-248832578
                            • Opcode ID: 544a1667b2bd253d3e817ad9c29527afe8613f051d6df3be5cb0bca2504a3420
                            • Instruction ID: 24926096c943187a016d953fe808ce2acf1242cb654f72e39a34338bfc4b4f1c
                            • Opcode Fuzzy Hash: 544a1667b2bd253d3e817ad9c29527afe8613f051d6df3be5cb0bca2504a3420
                            • Instruction Fuzzy Hash: 0E3108719002486FEB248E79CC84EEB7BBDDB45304F14419EF858D7251EB34EE418B94
                            APIs
                            • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,004419DC,?,00000004), ref: 00445E6F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: InfoLocale
                            • String ID: GetLocaleInfoEx
                            • API String ID: 2299586839-2904428671
                            • Opcode ID: f9893d92672fa9c5b6d787f9f7f2d4c4b9fbd30947df5498ead6f72c32f4f3f0
                            • Instruction ID: a9bb3d2992a9d1fe8e60343c55b6d981a628f421e7cf107d295b861f9edee2c3
                            • Opcode Fuzzy Hash: f9893d92672fa9c5b6d787f9f7f2d4c4b9fbd30947df5498ead6f72c32f4f3f0
                            • Instruction Fuzzy Hash: 6DF0F631600708BBDF016F619C05F6E7B51EB14721F10401BFC051A253CA758D109A9D
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4196e068c390569144ba97144776be62b0eb254e97c7fe9274842686a6009a67
                            • Instruction ID: 1c47d48333aa2aee23a91f6ecd96940ee01f0d1a5fc0d697d822b355cdd05c70
                            • Opcode Fuzzy Hash: 4196e068c390569144ba97144776be62b0eb254e97c7fe9274842686a6009a67
                            • Instruction Fuzzy Hash: C4022E71E002199BEF14CFA9C8806AEF7F1EF88715F25816AE819E7341D735AE45CB84
                            APIs
                            • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 004068E8
                            • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 004069B0
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: FileFind$FirstNext
                            • String ID:
                            • API String ID: 1690352074-0
                            • Opcode ID: 7e25bdacc7472894e2c66f6117db2a015ee01a90cc2c70388c13679fa63f3c74
                            • Instruction ID: f886cb8170a1cbefaa312452e39d18d6cd017e90ab843946bfd6f4b2f28fefe7
                            • Opcode Fuzzy Hash: 7e25bdacc7472894e2c66f6117db2a015ee01a90cc2c70388c13679fa63f3c74
                            • Instruction Fuzzy Hash: 9C218F711043015BC314FBA1DC96CEFB7ACAF91358F400A3EF596621E1EF389A09CA5A
                            APIs
                            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00450506,?,?,00000008,?,?,004533BD,00000000), ref: 00450738
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExceptionRaise
                            • String ID:
                            • API String ID: 3997070919-0
                            • Opcode ID: 5efd9235541867ec3ed9cd4b3b8e6b094e4fd6c2cbb45d95a394c96c6b6622d2
                            • Instruction ID: 84d157482befc24a690b5ca75d770a61b966f8e925af1348fa8ee8768c6acf08
                            • Opcode Fuzzy Hash: 5efd9235541867ec3ed9cd4b3b8e6b094e4fd6c2cbb45d95a394c96c6b6622d2
                            • Instruction Fuzzy Hash: C4B17B391106089FD714CF28C48AB657BE0FF48365F298659EC99CF2A2C339E996CF44
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: 0
                            • API String ID: 0-4108050209
                            • Opcode ID: a0300bf0e74490e07b48137b646e8018063fd0ad9baab8b1153cdb7e3f9059d1
                            • Instruction ID: 320eb4b805cbc27e3b43fdc18f554f89df5109ee0a66c35b650df9f3f8f200d4
                            • Opcode Fuzzy Hash: a0300bf0e74490e07b48137b646e8018063fd0ad9baab8b1153cdb7e3f9059d1
                            • Instruction Fuzzy Hash: 031241326083008BD714DF65D852A1EB3E2BFCC758F194D2EF585A73A1DB74E8168B46
                            APIs
                              • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                              • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                              • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                              • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                              • Part of subcall function 00445725: _free.LIBCMT ref: 00445784
                              • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 00445791
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0044F547
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast$_free$InfoLocale_abort
                            • String ID:
                            • API String ID: 1663032902-0
                            • Opcode ID: ad0e0b7788e936bcfdd9e0a2c8ea1aecabb77b710f5984c66624a7eb150c0fcd
                            • Instruction ID: 815750de5804ab4a8f75770bcc990d44dba9c2967eca50803adc2dd3443e40da
                            • Opcode Fuzzy Hash: ad0e0b7788e936bcfdd9e0a2c8ea1aecabb77b710f5984c66624a7eb150c0fcd
                            • Instruction Fuzzy Hash: 6421B372901206BBEF249F26DC45A7A73A8EB04315F10017BFD01C6242EB78AD59CB59
                            APIs
                              • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                              • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                              • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                              • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                            • EnumSystemLocalesW.KERNEL32(0044F2A3,00000001,00000000,?,00441F7E,?,0044F8D0,00000000,?,?,?), ref: 0044F1ED
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast$EnumLocalesSystem_abort_free
                            • String ID:
                            • API String ID: 1084509184-0
                            • Opcode ID: 1e67477eb4f1d9c825940ef83573ecb2aed64948dc5e5734fb002b4aa87f20f9
                            • Instruction ID: fc4c71b657a69648ba6c32e8c27400de65702582941300ca2eca7bc8fd592fd6
                            • Opcode Fuzzy Hash: 1e67477eb4f1d9c825940ef83573ecb2aed64948dc5e5734fb002b4aa87f20f9
                            • Instruction Fuzzy Hash: D811293B6007019FEB189F39D89167BBB91FF80358B14443DE94647B40D776A946C744
                            APIs
                              • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                              • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                              • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                              • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                            • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0044F4C1,00000000,00000000,?), ref: 0044F74F
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast$InfoLocale_abort_free
                            • String ID:
                            • API String ID: 2692324296-0
                            • Opcode ID: c5ca8868f81a5dafb3fdb259ff2b8ec3965b2bfb8aabdce9695f87c3ae70661f
                            • Instruction ID: e4b95bc4a5e1061338a04706472302caa06a68982d3ebb8569a44a178f9f49d5
                            • Opcode Fuzzy Hash: c5ca8868f81a5dafb3fdb259ff2b8ec3965b2bfb8aabdce9695f87c3ae70661f
                            • Instruction Fuzzy Hash: 09F02D36600516BBFB245B65DC05BBB7768EF40764F05447AEC19A3240EA7CFD05C6D4
                            APIs
                              • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                              • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                              • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                              • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                            • EnumSystemLocalesW.KERNEL32(0044F4F3,00000001,?,?,00441F7E,?,0044F894,00441F7E,?,?,?,?,?,00441F7E,?,?), ref: 0044F262
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast$EnumLocalesSystem_abort_free
                            • String ID:
                            • API String ID: 1084509184-0
                            • Opcode ID: d9e72da5ca64d0dbd4f9725887adba7bc59a573407832ad1990d17eaaac4c4d9
                            • Instruction ID: 7c38563944de2097393583401858843e6c2e12a799e64e453201a09b71e8bce8
                            • Opcode Fuzzy Hash: d9e72da5ca64d0dbd4f9725887adba7bc59a573407832ad1990d17eaaac4c4d9
                            • Instruction Fuzzy Hash: 44F0223A2007045FEB145F399881A7B7B94FF8036CB15447EF9458B690DAB6AC068614
                            APIs
                              • Part of subcall function 00442D9A: EnterCriticalSection.KERNEL32(-0006A42D,?,004404DB,00000000,0046B4D8,0000000C,00440496,?,?,?,00443038,?,?,004457DA,00000001,00000364), ref: 00442DA9
                            • EnumSystemLocalesW.KERNEL32(004458CE,00000001,0046B680,0000000C), ref: 0044594C
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CriticalEnterEnumLocalesSectionSystem
                            • String ID:
                            • API String ID: 1272433827-0
                            • Opcode ID: 9f071f7aa8f2d5cfdb4dd86670e259d2fa7dae68b4529c3cbc217272811744e5
                            • Instruction ID: 57fcd2d1ba6fdacad71b84952267562ddc6b8062f8818d57533dd41bf3368d71
                            • Opcode Fuzzy Hash: 9f071f7aa8f2d5cfdb4dd86670e259d2fa7dae68b4529c3cbc217272811744e5
                            • Instruction Fuzzy Hash: CFF03C72A10700EFEB00EF69D846B5D77F0EB08325F10402AF400DB2A2DAB989448B5E
                            APIs
                              • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                              • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                              • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                              • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                            • EnumSystemLocalesW.KERNEL32(0044F087,00000001,?,?,?,0044F8F2,00441F7E,?,?,?,?,?,00441F7E,?,?,?), ref: 0044F167
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast$EnumLocalesSystem_abort_free
                            • String ID:
                            • API String ID: 1084509184-0
                            • Opcode ID: 27fc750af04bae75093f47f6c8e3f33632e5f31a47d704513601fd173c54c35f
                            • Instruction ID: 407cbbfb1d6a14fdc0c4ba4a8479f65f1c0a46e2fba7f2f7bc53bc9e3406d240
                            • Opcode Fuzzy Hash: 27fc750af04bae75093f47f6c8e3f33632e5f31a47d704513601fd173c54c35f
                            • Instruction Fuzzy Hash: 22F05C3930020597DB049F35D845A7ABFA0EFC1754F060069EA058B651C6359C46C754
                            APIs
                            • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,00413F34,00471E78,00472910,00471E78,00000000,00471E78,00000000,00471E78,3.8.0 Pro), ref: 0040E2CF
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: InfoLocale
                            • String ID:
                            • API String ID: 2299586839-0
                            • Opcode ID: 4f9fc82b5c10d6610e5ed6531d98e333281f4b2b56e24c5c8b0cdbea65e89b46
                            • Instruction ID: e43a985d938ffd5d313bbeec62feab64fa47c80c67ee5e1720aa7bcbe65aeca7
                            • Opcode Fuzzy Hash: 4f9fc82b5c10d6610e5ed6531d98e333281f4b2b56e24c5c8b0cdbea65e89b46
                            • Instruction Fuzzy Hash: 65D05E30B4421C7BEA10D6859C0AEAA7B9CD701B62F0001A6BA08D72D0E9E1AE0487E6
                            APIs
                            • SetUnhandledExceptionFilter.KERNEL32(Function_00032908,0043262F), ref: 00432901
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExceptionFilterUnhandled
                            • String ID:
                            • API String ID: 3192549508-0
                            • Opcode ID: 937b0859e2ecbaa4ed0ef4ac8f36e04938c9481000da7c0a06be09f57d080333
                            • Instruction ID: aee9a4537fe14d989eba5338f3e0e07ed20d0bd3150f914eab3e23255f36ef43
                            • Opcode Fuzzy Hash: 937b0859e2ecbaa4ed0ef4ac8f36e04938c9481000da7c0a06be09f57d080333
                            • Instruction Fuzzy Hash:
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: @
                            • API String ID: 0-2766056989
                            • Opcode ID: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                            • Instruction ID: 6198f9fd5856e2fadc0eee1ef7bf8112c6a5ea678d4112deff0a08df7cd0a8a1
                            • Opcode Fuzzy Hash: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                            • Instruction Fuzzy Hash: 83410975A187458BC344CF29C58061BFBE1FFD8314F645A1EF889A3350D7B9E9828B86
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7f53e293dee35998a8249f38609762a9e2a15299405adcda504afdded652bb6e
                            • Instruction ID: ac95e4143a92ff0618d82a399ec7b133dd136baee215df138bf5792b33e3284f
                            • Opcode Fuzzy Hash: 7f53e293dee35998a8249f38609762a9e2a15299405adcda504afdded652bb6e
                            • Instruction Fuzzy Hash: 7B322621D29F414DE7239A35C872336A24CEFB73C9F15D737E81AB5AA6EB28C4834144
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 50af37b9a175ce14eb324e5c1ed9abad27adb6fe4a1ef569414f45832d490dbf
                            • Instruction ID: ddb96738fd74990a51aa4d57cd7ecd2d3edd4d3efe0166ecbb7dd1f918ebfc19
                            • Opcode Fuzzy Hash: 50af37b9a175ce14eb324e5c1ed9abad27adb6fe4a1ef569414f45832d490dbf
                            • Instruction Fuzzy Hash: F832C6B1A087459BC719DF28C8807ABB7E1BF85318F04462EF89587381D778DD85CB8A
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e89ef7e7b923af77b564abd17556c595491ff083d1dcc815111e70b52dbb4713
                            • Instruction ID: 5c6380b7442203eb09b5b6243dbf6f2b0d892e6a2da6515435673998fb66d49f
                            • Opcode Fuzzy Hash: e89ef7e7b923af77b564abd17556c595491ff083d1dcc815111e70b52dbb4713
                            • Instruction Fuzzy Hash: C602A471714A528FC758CF2EEC4063AB7E1AB8E306B85453EE495C7781EB34E921CB94
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3d5cfc841615d404c8faad9089b9236c22e56981a6e79550f22df887260c3724
                            • Instruction ID: 9832893ecb8716a8230fb1444da9bced5d75184ca3800c066fd9b1088accf213
                            • Opcode Fuzzy Hash: 3d5cfc841615d404c8faad9089b9236c22e56981a6e79550f22df887260c3724
                            • Instruction Fuzzy Hash: CEF181356246558FC304DF1DE89192BB3E1FB89306F85092EF182C7391DB78E925CB9A
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                            • Instruction ID: 656262e35da032ffd0a077b83a64e39d55d78725ba1fa3deec4bc033c2bd9230
                            • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                            • Instruction Fuzzy Hash: 21C1C1322059930ADF2D4639853503FFBE15AA67B171A2B6FD4B7CB2C4FE28C524D624
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                            • Instruction ID: 83a77ad86d3d882556a1d1f8a871d3d99dabfb51986f73d2778cf32764f6a177
                            • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                            • Instruction Fuzzy Hash: 7FC1E3322055930ADF2D8639C53103FBBE15AA67B171B676FD4B6CB2C4FE28C524D624
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                            • Instruction ID: 2e2fcf76ea68e3d1ce03a604506cc299a951e5de5e734e711f809c72e20f7287
                            • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                            • Instruction Fuzzy Hash: 12C1C2322059934ADF2D4639857103FBBE15EA67B1B1A276FD4B7CB2C0FE28C524D624
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                            • Instruction ID: cc9b1a5688ee457b4940033b23912546db57db7e3d6d8e70cc9d87b8c0cd44da
                            • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                            • Instruction Fuzzy Hash: 25C1F6322059930ADF2D463AC53113FBBE15AA57B171A276FD8B7CB2C4FE28C524C614
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b45d96e7aefd3491f5d2e691491dd724977453d1c4d3235044e3c94c9fc636e7
                            • Instruction ID: d47e39d1b20c68f472f2cbcbc0b1e5e76a9f7a6e19272067298aabf3f738eb94
                            • Opcode Fuzzy Hash: b45d96e7aefd3491f5d2e691491dd724977453d1c4d3235044e3c94c9fc636e7
                            • Instruction Fuzzy Hash: E1B184791142998ACB05EF68C4913F63BA1EF6A300F0850B9EC9CCF757E3398506EB64
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a25cfcba4cb24fdf0fe01b1cfb0217293a2d97f1f2c5caf2e195f2ab18ef9283
                            • Instruction ID: ae92f65c41008aac329c7d646b8d99fb38e08d933e524e45c1d49ddbea67f2dd
                            • Opcode Fuzzy Hash: a25cfcba4cb24fdf0fe01b1cfb0217293a2d97f1f2c5caf2e195f2ab18ef9283
                            • Instruction Fuzzy Hash: 36616671E00B0866DA389A2968927BF2795DB2D708F14392FF483DF3C1C66D9D42C65E
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5939193a035a9f71e1be9e8e65b71e813b2798266dd155f684168ca2d02e33de
                            • Instruction ID: 723622f834e47c23106d271d0d88d1dc321cab027353f38a50b8b0e2426ac40f
                            • Opcode Fuzzy Hash: 5939193a035a9f71e1be9e8e65b71e813b2798266dd155f684168ca2d02e33de
                            • Instruction Fuzzy Hash: D4518BB1E0864457DF38A9A976557BFA7899B4D304F18391FD882D7382C60CED06C31E
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2c66de2964dbf7c0103d26a637bb9c3df90e686996b70b361c2c57e4183adb73
                            • Instruction ID: 66342361016897109e24a26c448f772de671845df11bd1e198e526645aade2d2
                            • Opcode Fuzzy Hash: 2c66de2964dbf7c0103d26a637bb9c3df90e686996b70b361c2c57e4183adb73
                            • Instruction Fuzzy Hash: CD518970E10A0556DB394969B9957BF379A9F1E304F18380FE842DB382C28CDD06D35E
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5661015b8a2eeb9aa3a03a28a56479055063bbb10d2211e9a29d8fca6858534d
                            • Instruction ID: 6d2995492066a9b16b195f6531796c1ccffa7af2014367dacfc1c2128089f42d
                            • Opcode Fuzzy Hash: 5661015b8a2eeb9aa3a03a28a56479055063bbb10d2211e9a29d8fca6858534d
                            • Instruction Fuzzy Hash: 49617F326083049FC304DF75E482A5FB7E4AFCC718F450E2EF49996251E774EA088B86
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                            • Instruction ID: 3c347dad04b4a8ced02cdc3a1d1f73fe72ec142e803a1f09a224371d112cc28a
                            • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                            • Instruction Fuzzy Hash: E811297720104373E6158A2DF4B86B7A7A5EACD320F2FE377C0424B75CC12AD5559508
                            APIs
                            • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00416E98
                            • CreateCompatibleDC.GDI32(00000000), ref: 00416EA5
                              • Part of subcall function 004172DF: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 0041730F
                            • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00416F1B
                            • DeleteDC.GDI32(00000000), ref: 00416F32
                            • DeleteDC.GDI32(00000000), ref: 00416F35
                            • DeleteObject.GDI32(00000000), ref: 00416F38
                            • SelectObject.GDI32(00000000,00000000), ref: 00416F59
                            • DeleteDC.GDI32(00000000), ref: 00416F6A
                            • DeleteDC.GDI32(00000000), ref: 00416F6D
                            • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00416F91
                            • GetCursorInfo.USER32(?), ref: 00416FAF
                            • GetIconInfo.USER32(?,?), ref: 00416FC5
                            • DeleteObject.GDI32(?), ref: 00416FF4
                            • DeleteObject.GDI32(?), ref: 00417001
                            • DrawIcon.USER32(00000000,?,?,?), ref: 0041700E
                            • GetObjectA.GDI32(00000000,00000018,?), ref: 00417026
                            • LocalAlloc.KERNEL32(00000040,00000001), ref: 00417095
                            • GlobalAlloc.KERNEL32(00000000,?), ref: 00417104
                            • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00417128
                            • DeleteDC.GDI32(?), ref: 0041713C
                            • DeleteDC.GDI32(00000000), ref: 0041713F
                            • DeleteObject.GDI32(00000000), ref: 00417142
                            • GlobalFree.KERNEL32(?), ref: 0041714D
                            • DeleteObject.GDI32(00000000), ref: 00417201
                            • GlobalFree.KERNEL32(?), ref: 00417208
                            • DeleteDC.GDI32(?), ref: 00417218
                            • DeleteDC.GDI32(00000000), ref: 00417223
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIconInfo$BitmapBitsCursorDisplayDrawEnumLocalSelectSettingsStretch
                            • String ID: DISPLAY
                            • API String ID: 4256916514-865373369
                            • Opcode ID: 6a561aeaad0dc4555bbb11be0c9e4d6b31caaa4553089fdc37a4d0c6b356d7e5
                            • Instruction ID: 4ba325f74191387ade15767708145f982ef5b1c7ca4df498548f130554e7309d
                            • Opcode Fuzzy Hash: 6a561aeaad0dc4555bbb11be0c9e4d6b31caaa4553089fdc37a4d0c6b356d7e5
                            • Instruction Fuzzy Hash: 6FB16A315083009FD720DF24DC44BABBBE9EF88755F41482EF98993291DB38E945CB5A
                            APIs
                            • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00416474
                            • GetProcAddress.KERNEL32(00000000), ref: 00416477
                            • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00416488
                            • GetProcAddress.KERNEL32(00000000), ref: 0041648B
                            • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041649C
                            • GetProcAddress.KERNEL32(00000000), ref: 0041649F
                            • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004164B0
                            • GetProcAddress.KERNEL32(00000000), ref: 004164B3
                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00416555
                            • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041656D
                            • GetThreadContext.KERNEL32(?,00000000), ref: 00416583
                            • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004165A9
                            • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041662B
                            • TerminateProcess.KERNEL32(?,00000000), ref: 0041663F
                            • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041667F
                            • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00416749
                            • SetThreadContext.KERNEL32(?,00000000), ref: 00416766
                            • ResumeThread.KERNEL32(?), ref: 00416773
                            • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041678A
                            • GetCurrentProcess.KERNEL32(?), ref: 00416795
                            • TerminateProcess.KERNEL32(?,00000000), ref: 004167B0
                            • GetLastError.KERNEL32 ref: 004167B8
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                            • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                            • API String ID: 4188446516-3035715614
                            • Opcode ID: 95136cae06b6c6de2e48ba00139107378fb37b92ff4b2ee653c99aadd9b5648f
                            • Instruction ID: 94204e0ceb90eb3d518cc699b6b418d02f123724867831e7a48fec904b930286
                            • Opcode Fuzzy Hash: 95136cae06b6c6de2e48ba00139107378fb37b92ff4b2ee653c99aadd9b5648f
                            • Instruction Fuzzy Hash: 9CA18E71604300AFDB109F64DC85F6B7BE8FB48749F00092AF695D62A1E7B8EC44CB5A
                            APIs
                            • _wcslen.LIBCMT ref: 0040B882
                            • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,00471FFC), ref: 0040B89B
                            • CopyFileW.KERNEL32(C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe,00000000,00000000,00000000,00000000,00000000,?,00471FFC), ref: 0040B952
                            • _wcslen.LIBCMT ref: 0040B968
                            • CopyFileW.KERNEL32(C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe,00000000,00000000,00000000), ref: 0040B9E0
                            • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BA22
                            • _wcslen.LIBCMT ref: 0040BA25
                            • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BA3C
                            • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040BC2A
                            • ExitProcess.KERNEL32 ref: 0040BC36
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$_wcslen$AttributesCopy$CreateDirectoryExecuteExitProcessShell
                            • String ID: """, 0$$.F$6$C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe$CreateObject("WScript.Shell").Run "cmd /c ""$Rmc$Set fso = CreateObject("Scripting.FileSystemObject")$Temp$WScript.Sleep 1000$XIK$\install.vbs$fso.DeleteFile $fso.DeleteFile(Wscript.ScriptFullName)$open$t<F
                            • API String ID: 2743683619-3580749668
                            • Opcode ID: b6e2d2e9b205d6c2651acfcf9edbb679f45142d0a28fcb4aa326156a67d47466
                            • Instruction ID: 1f37921bc36cc04280d9be7a1af933bc03f5727a4608831148a2c1203a4a5f71
                            • Opcode Fuzzy Hash: b6e2d2e9b205d6c2651acfcf9edbb679f45142d0a28fcb4aa326156a67d47466
                            • Instruction Fuzzy Hash: CA9161712083415BC218F766DC92EAF77D8AF90708F50043FF546A61E2EE7C9A49C69E
                            APIs
                              • Part of subcall function 004112B5: TerminateProcess.KERNEL32(00000000,XIK,0040E2B2), ref: 004112C5
                              • Part of subcall function 004112B5: WaitForSingleObject.KERNEL32(000000FF), ref: 004112D8
                            • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C0D6
                            • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C0E9
                            • SetFileAttributesW.KERNEL32(?,00000080), ref: 0040C102
                            • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040C132
                              • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(Function_00009305,00000000,XIK,0040BC76,?,00472200,pth_unenc,XIK), ref: 0040A801
                              • Part of subcall function 0040A7F2: UnhookWindowsHookEx.USER32(0001043B), ref: 0040A811
                              • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(004092EF,00000000,?,00472200,pth_unenc,XIK), ref: 0040A823
                              • Part of subcall function 0041A17B: CreateFileW.KERNELBASE(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0041A29A,00000000,00000000,?), ref: 0041A1BA
                            • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040C37D
                            • ExitProcess.KERNEL32 ref: 0040C389
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                            • String ID: """, 0$")$CreateObject("WScript.Shell").Run "cmd /c ""$H"G$On Error Resume Next$Rmc$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$t<F$wend$while fso.FileExists("
                            • API String ID: 1861856835-1286743881
                            • Opcode ID: 05583eb4b7a5ed2b794d020ea8817c816daaf2b981d185ea84975e725f2e2806
                            • Instruction ID: 20f5f97700cb48a3d0b4a42ff25d793d854bdbfc6fb2dd54058f707cc559a17d
                            • Opcode Fuzzy Hash: 05583eb4b7a5ed2b794d020ea8817c816daaf2b981d185ea84975e725f2e2806
                            • Instruction Fuzzy Hash: 579180712042405AC314FB62D8929EF77E99F90708F50453FB586B31E3EE789E49C69E
                            APIs
                              • Part of subcall function 004112B5: TerminateProcess.KERNEL32(00000000,XIK,0040E2B2), ref: 004112C5
                              • Part of subcall function 004112B5: WaitForSingleObject.KERNEL32(000000FF), ref: 004112D8
                            • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,00472200,pth_unenc,XIK), ref: 0040BD63
                            • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040BD76
                            • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,00472200,pth_unenc,XIK), ref: 0040BDA6
                            • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,00472200,pth_unenc,XIK), ref: 0040BDB5
                              • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(Function_00009305,00000000,XIK,0040BC76,?,00472200,pth_unenc,XIK), ref: 0040A801
                              • Part of subcall function 0040A7F2: UnhookWindowsHookEx.USER32(0001043B), ref: 0040A811
                              • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(004092EF,00000000,?,00472200,pth_unenc,XIK), ref: 0040A823
                              • Part of subcall function 00419959: GetCurrentProcessId.KERNEL32(00000000,76F93530,00000000,?,?,?,?,00469654,0040BDCB,.vbs,?,?,?,?,?,00472200), ref: 00419980
                            • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040BFD0
                            • ExitProcess.KERNEL32 ref: 0040BFD7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                            • String ID: ")$.vbs$H"G$On Error Resume Next$Rmc$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$XIK$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("
                            • API String ID: 3797177996-1081141069
                            • Opcode ID: 65c62e2586f3db2bf5f1ea3e42eddf2d762bcde93dc637b6826e4d6a9636ac5a
                            • Instruction ID: 6c8f8b33712d81dc7036d24bc004af62d002185c7e194acf753e7914dc64dab3
                            • Opcode Fuzzy Hash: 65c62e2586f3db2bf5f1ea3e42eddf2d762bcde93dc637b6826e4d6a9636ac5a
                            • Instruction Fuzzy Hash: DD816E716042405AC714FB62D8929EF77A8AF90708F10443FF586A71E2EF789E49C69E
                            APIs
                            • CreateMutexA.KERNEL32(00000000,00000001,00000000,00472200,00471FFC,00000000), ref: 00410EF9
                            • ExitProcess.KERNEL32(00000000), ref: 00410F05
                            • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00410F7F
                            • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00410F8E
                            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00410F99
                            • CloseHandle.KERNEL32(00000000), ref: 00410FA0
                            • GetCurrentProcessId.KERNEL32 ref: 00410FA6
                            • PathFileExistsW.SHLWAPI(?), ref: 00410FD7
                            • GetTempPathW.KERNEL32(00000104,?), ref: 0041103A
                            • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 00411054
                            • lstrcatW.KERNEL32(?,.exe), ref: 00411066
                              • Part of subcall function 0041A17B: CreateFileW.KERNELBASE(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0041A29A,00000000,00000000,?), ref: 0041A1BA
                            • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 004110A6
                            • Sleep.KERNEL32(000001F4), ref: 004110E7
                            • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 004110FC
                            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00411107
                            • CloseHandle.KERNEL32(00000000), ref: 0041110E
                            • GetCurrentProcessId.KERNEL32 ref: 00411114
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                            • String ID: (#G$.exe$H"G$WDH$exepath$open$temp_
                            • API String ID: 2649220323-71629269
                            • Opcode ID: 5a622c93cbd677723bc87a298f08cc88cd5ecd73257b4a2a5ed88e6668a52605
                            • Instruction ID: 69aa2ac3f34532c799e46254488c9bc95b38e37df126af38d98eea17990f3aaa
                            • Opcode Fuzzy Hash: 5a622c93cbd677723bc87a298f08cc88cd5ecd73257b4a2a5ed88e6668a52605
                            • Instruction Fuzzy Hash: 9D51A671A003196BDF10A7A09C59EEE336D9B04715F5041BBF605A31E2EFBC8E86875D
                            APIs
                            • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 004190F2
                            • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 00419106
                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00463050), ref: 0041912E
                            • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00471E78,00000000), ref: 00419144
                            • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 00419185
                            • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041919D
                            • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 004191B2
                            • SetEvent.KERNEL32 ref: 004191CF
                            • WaitForSingleObject.KERNEL32(000001F4), ref: 004191E0
                            • CloseHandle.KERNEL32 ref: 004191F0
                            • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 00419212
                            • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041921C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                            • String ID: alias audio$" type $P0F$close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped
                            • API String ID: 738084811-3254062235
                            • Opcode ID: cd45fdd0cc5b30074e2a52fd6c7e71e7ab7864881048245ea6797483358a3cc1
                            • Instruction ID: 6660e32d934ed13bda46fa62e77153e47455c80990ba371f4f5bcee5a70a39dd
                            • Opcode Fuzzy Hash: cd45fdd0cc5b30074e2a52fd6c7e71e7ab7864881048245ea6797483358a3cc1
                            • Instruction Fuzzy Hash: 6C5191712043056BD604FB75DC96EBF369CDB81398F10053FF44A621E2EE789D898A6E
                            APIs
                            • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AB9
                            • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401AE3
                            • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401AF3
                            • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B03
                            • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B13
                            • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B23
                            • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B34
                            • WriteFile.KERNEL32(00000000,0046FA9A,00000002,00000000,00000000), ref: 00401B45
                            • WriteFile.KERNEL32(00000000,0046FA9C,00000004,00000000,00000000), ref: 00401B55
                            • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B65
                            • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B76
                            • WriteFile.KERNEL32(00000000,0046FAA6,00000002,00000000,00000000), ref: 00401B87
                            • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401B97
                            • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BA7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$Write$Create
                            • String ID: RIFF$WAVE$data$fmt
                            • API String ID: 1602526932-4212202414
                            • Opcode ID: e953cdad80a2b5f15463d19f06cbbe214ca4708b9acf4e214683fef01c63ba87
                            • Instruction ID: fa9573d22dfebaa7cc70b9682dc8642ba3498ee27ac2ec60dc87a96e6c13d219
                            • Opcode Fuzzy Hash: e953cdad80a2b5f15463d19f06cbbe214ca4708b9acf4e214683fef01c63ba87
                            • Instruction Fuzzy Hash: 46416F726543197AE210DB91DD85FBB7EECEB85B50F40042AF648D6080E7A4E909DBB3
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$EnvironmentVariable$_wcschr
                            • String ID:
                            • API String ID: 3899193279-0
                            • Opcode ID: 8f8f6bf8198f661361f87136ecb7ebf93a417bae196628050410ce4dfb3fc85f
                            • Instruction ID: f90cfe9d57a3c7213274ca364bab7ea13f4483d5bd7e80e8c07ab134bc70d503
                            • Opcode Fuzzy Hash: 8f8f6bf8198f661361f87136ecb7ebf93a417bae196628050410ce4dfb3fc85f
                            • Instruction Fuzzy Hash: 80D136719023007BFB60AF7598C166B7BA4AF15718F09817FF985A7381FB3989008B5D
                            APIs
                            • ___free_lconv_mon.LIBCMT ref: 0044E4EA
                              • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D6FF
                              • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D711
                              • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D723
                              • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D735
                              • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D747
                              • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D759
                              • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D76B
                              • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D77D
                              • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D78F
                              • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7A1
                              • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7B3
                              • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7C5
                              • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7D7
                            • _free.LIBCMT ref: 0044E4DF
                              • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                              • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                            • _free.LIBCMT ref: 0044E501
                            • _free.LIBCMT ref: 0044E516
                            • _free.LIBCMT ref: 0044E521
                            • _free.LIBCMT ref: 0044E543
                            • _free.LIBCMT ref: 0044E556
                            • _free.LIBCMT ref: 0044E564
                            • _free.LIBCMT ref: 0044E56F
                            • _free.LIBCMT ref: 0044E5A7
                            • _free.LIBCMT ref: 0044E5AE
                            • _free.LIBCMT ref: 0044E5CB
                            • _free.LIBCMT ref: 0044E5E3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                            • String ID: xF
                            • API String ID: 161543041-2169143296
                            • Opcode ID: b166b7e86ef1a7ddfa2e36ec319a6e916c21ca5d81851e2e5517d42b5c42f7b7
                            • Instruction ID: 6e8371ae3b83bc2427c047bff221b97f6cd80994471b0a2caeb41cff5b169df7
                            • Opcode Fuzzy Hash: b166b7e86ef1a7ddfa2e36ec319a6e916c21ca5d81851e2e5517d42b5c42f7b7
                            • Instruction Fuzzy Hash: D4315072500304AFFB205E7AD945B5BB3E5BF00719F55851FE488D6251EE39ED408B18
                            APIs
                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 004118B2
                              • Part of subcall function 00419959: GetCurrentProcessId.KERNEL32(00000000,76F93530,00000000,?,?,?,?,00469654,0040BDCB,.vbs,?,?,?,?,?,00472200), ref: 00419980
                              • Part of subcall function 004168A6: CloseHandle.KERNEL32(004040D5,?,?,004040D5,00462E24), ref: 004168BC
                              • Part of subcall function 004168A6: CloseHandle.KERNEL32($.F,?,?,004040D5,00462E24), ref: 004168C5
                            • Sleep.KERNEL32(0000000A,00462E24), ref: 00411A01
                            • Sleep.KERNEL32(0000000A,00462E24,00462E24), ref: 00411AA3
                            • Sleep.KERNEL32(0000000A,00462E24,00462E24,00462E24), ref: 00411B42
                            • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411B9F
                            • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411BCF
                            • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411C05
                            • Sleep.KERNEL32(000001F4,00462E24,00462E24,00462E24), ref: 00411C25
                            • Sleep.KERNEL32(00000064), ref: 00411C63
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcess
                            • String ID: /stext "$$.F$@#G$@#G
                            • API String ID: 2485855082-2596709126
                            • Opcode ID: 9da7743cbd066f4f8e7d329de3ee7aa4cbf3c62d1f034e2551cfa13a1f590eab
                            • Instruction ID: f36e1428a9e5a2dc2e21cca38a330b771dfaab2ce7ac60874593ee94e899fa44
                            • Opcode Fuzzy Hash: 9da7743cbd066f4f8e7d329de3ee7aa4cbf3c62d1f034e2551cfa13a1f590eab
                            • Instruction Fuzzy Hash: 1CF154311083415AD328FB65D896AEFB3D5AFD0348F40093FF586521E2EF789A4DC69A
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free
                            • String ID: pF
                            • API String ID: 269201875-2973420481
                            • Opcode ID: 2d61484940682ee786660686f26dc7be5fdbe1d580820abb244bed0f912383bb
                            • Instruction ID: 42ad863364e9847d0c0ab7d3fc56807329b255bf3c924c15ca724e031f0c4a7b
                            • Opcode Fuzzy Hash: 2d61484940682ee786660686f26dc7be5fdbe1d580820abb244bed0f912383bb
                            • Instruction Fuzzy Hash: 4CC17576D40204ABEB20DFA9CC82FEE77F8AF09B05F154156FE04FB282D674A9458754
                            APIs
                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00472248,00471FFC,?,00000001), ref: 0040DE4E
                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000001), ref: 0040DE79
                            • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040DE95
                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040DF14
                            • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000001), ref: 0040DF23
                              • Part of subcall function 00419F87: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000), ref: 00419F9C
                            • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,?,00000001), ref: 0040E047
                            • CloseHandle.KERNEL32(00000000,C:\Program Files(x86)\Internet Explorer\,?,00000001), ref: 0040E133
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseCreateHandleProcess32$FileFirstModuleMutexNameNextOpenProcessSnapshotToolhelp32
                            • String ID: C:\Program Files(x86)\Internet Explorer\$Chrorne-CKQJ2Y$Inj$XIK$ieinstal.exe$ielowutil.exe
                            • API String ID: 193334293-918240369
                            • Opcode ID: feab21a1852f047310f6685b427b70b5c9e64bd02adc4046395c9f32df85110b
                            • Instruction ID: 8a3cf51a80cb2752f7e3b1027b115d9c77e2b7a511041fa54b012784d9d6af0a
                            • Opcode Fuzzy Hash: feab21a1852f047310f6685b427b70b5c9e64bd02adc4046395c9f32df85110b
                            • Instruction Fuzzy Hash: DB8121305083419BCA54FB61D8919EEB7E4AFA0348F40493FF586631E2EF78994DC75A
                            APIs
                            • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041B38F
                            • GetCursorPos.USER32(?), ref: 0041B39E
                            • SetForegroundWindow.USER32(?), ref: 0041B3A7
                            • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041B3C1
                            • Shell_NotifyIconA.SHELL32(00000002,00471AE0), ref: 0041B412
                            • ExitProcess.KERNEL32 ref: 0041B41A
                            • CreatePopupMenu.USER32 ref: 0041B420
                            • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041B435
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                            • String ID: Close
                            • API String ID: 1657328048-3535843008
                            • Opcode ID: a6176c0d6380f4aee2a94f66beec31abf772cd011930890969aeab0fce4376ca
                            • Instruction ID: 8a5f592793453ec618f968136b1e584160f7030753e38ead18fcaf25e3e96fa7
                            • Opcode Fuzzy Hash: a6176c0d6380f4aee2a94f66beec31abf772cd011930890969aeab0fce4376ca
                            • Instruction Fuzzy Hash: EB211B31110209BFDF054FA4ED0DAAA3F75FB04302F458125F906D2176D7B5D9A0AB59
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$Info
                            • String ID:
                            • API String ID: 2509303402-0
                            • Opcode ID: 2f053ac60eb79ec191c053a7fddcedd63e35585dd27580e6f5fea4236b9889f4
                            • Instruction ID: c21780bae5ed168c96e0403295faec6c801d35bf5d84feaa2b3ea2b847582f92
                            • Opcode Fuzzy Hash: 2f053ac60eb79ec191c053a7fddcedd63e35585dd27580e6f5fea4236b9889f4
                            • Instruction Fuzzy Hash: 70B1D171900305AFEB11DF69C881BEEBBF4BF08705F14456EF588A7342DB799A418B24
                            APIs
                            • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0041382B
                            • LoadLibraryA.KERNEL32(?), ref: 0041386D
                            • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 0041388D
                            • FreeLibrary.KERNEL32(00000000), ref: 00413894
                            • LoadLibraryA.KERNEL32(?), ref: 004138CC
                            • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 004138DE
                            • FreeLibrary.KERNEL32(00000000), ref: 004138E5
                            • GetProcAddress.KERNEL32(00000000,?), ref: 004138F4
                            • FreeLibrary.KERNEL32(00000000), ref: 0041390B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Library$AddressFreeProc$Load$DirectorySystem
                            • String ID: \ws2_32$\wship6$getaddrinfo
                            • API String ID: 2490988753-3078833738
                            • Opcode ID: 21b812c9e8c8c8e619d1227956d82128857f9ec353fd6b4c7c84cf26c4fc7a8e
                            • Instruction ID: d28fd91e0c22c3548fe93de424e57890752fc739e59a71d3c7449bb4191d4936
                            • Opcode Fuzzy Hash: 21b812c9e8c8c8e619d1227956d82128857f9ec353fd6b4c7c84cf26c4fc7a8e
                            • Instruction Fuzzy Hash: 8831C0B2502315ABC720AF25DC489CBBBEC9F48755F41062AF84593251E7B8CE8486AE
                            APIs
                            • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00407D1F
                            • GetFileSizeEx.KERNEL32(00000000,?), ref: 00407D57
                            • __aulldiv.LIBCMT ref: 00407D89
                              • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                            • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00407EAC
                            • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00407EC7
                            • CloseHandle.KERNEL32(00000000), ref: 00407FA0
                            • CloseHandle.KERNEL32(00000000,00000052), ref: 00407FEA
                            • CloseHandle.KERNEL32(00000000), ref: 00408038
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldiv
                            • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller:
                            • API String ID: 1656873915-2596673759
                            • Opcode ID: c30e7b41ce650f3bb4d401e3eb582ad7b6827473fb70655691df81843dfc486f
                            • Instruction ID: 8e1224200a6c450cfdafa1dd663dcbd78fa1a86951e699dbe30fbedc525f5c9c
                            • Opcode Fuzzy Hash: c30e7b41ce650f3bb4d401e3eb582ad7b6827473fb70655691df81843dfc486f
                            • Instruction Fuzzy Hash: 05B191316083409BC354FB65C891AAFB7E9AFD4314F40492FF489622D2EF789D458B8B
                            APIs
                              • Part of subcall function 004112B5: TerminateProcess.KERNEL32(00000000,XIK,0040E2B2), ref: 004112C5
                              • Part of subcall function 004112B5: WaitForSingleObject.KERNEL32(000000FF), ref: 004112D8
                              • Part of subcall function 004120E8: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,00472200), ref: 00412104
                              • Part of subcall function 004120E8: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041211D
                              • Part of subcall function 004120E8: RegCloseKey.ADVAPI32(00000000), ref: 00412128
                            • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C412
                            • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040C571
                            • ExitProcess.KERNEL32 ref: 0040C57D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                            • String ID: """, 0$.vbs$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$H"G$Temp$exepath$open
                            • API String ID: 1913171305-2600661426
                            • Opcode ID: 7e8711152875b2f9a70f179e08c2da1f496ea5da31da38be705b0bf66f09fde0
                            • Instruction ID: b2ba4f5629099335deb4bd311fc34f74cd7c7cff7cc2b9b794c872af44b42b62
                            • Opcode Fuzzy Hash: 7e8711152875b2f9a70f179e08c2da1f496ea5da31da38be705b0bf66f09fde0
                            • Instruction Fuzzy Hash: 214132319001185ACB14FBA2DC96DEE7778AF50708F50017FF506B71E2EE785E4ACA99
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: 65535$udp
                            • API String ID: 0-1267037602
                            • Opcode ID: 28a355c3c2c5299b67e9df14989e725b3f395b8ff7de4f3ce545a5dea485fe56
                            • Instruction ID: 74e44cdacc71272d4b4fe4479ff5a2c38cc960f39e0e81ce023821ae7ff597b0
                            • Opcode Fuzzy Hash: 28a355c3c2c5299b67e9df14989e725b3f395b8ff7de4f3ce545a5dea485fe56
                            • Instruction Fuzzy Hash: 3151F1F5209302ABD7209E15C809BBB77D4AB84B52F08842FF8A1973D0D76CDEC0965E
                            APIs
                              • Part of subcall function 0041626A: __EH_prolog.LIBCMT ref: 0041626F
                            • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 004160E6
                            • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00463050), ref: 0041611A
                            • CloseHandle.KERNEL32(00000000), ref: 00416123
                            • DeleteFileA.KERNEL32(00000000), ref: 00416132
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWait
                            • String ID: <$@$@%G$@%G$P0F$Temp
                            • API String ID: 2516244461-846188940
                            • Opcode ID: c645e952e2ec1ddd43d33223918b3bd1b93e1fb5bc34ff552c204fa89aded1dd
                            • Instruction ID: 980de7e6e99344695fa922fac5fad97fc57b46ec9d0f9c422bd6bd0d3fbbc04a
                            • Opcode Fuzzy Hash: c645e952e2ec1ddd43d33223918b3bd1b93e1fb5bc34ff552c204fa89aded1dd
                            • Instruction Fuzzy Hash: 48419131900209ABDB14FB61DC56AEEB739AF50308F50417EF505760E2EF785E8ACB99
                            APIs
                            • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00438632
                            • GetLastError.KERNEL32(?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043863F
                            • __dosmaperr.LIBCMT ref: 00438646
                            • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00438672
                            • GetLastError.KERNEL32(?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043867C
                            • __dosmaperr.LIBCMT ref: 00438683
                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D35,?), ref: 004386C6
                            • GetLastError.KERNEL32(?,?,?,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004386D0
                            • __dosmaperr.LIBCMT ref: 004386D7
                            • _free.LIBCMT ref: 004386E3
                            • _free.LIBCMT ref: 004386EA
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                            • String ID:
                            • API String ID: 2441525078-0
                            • Opcode ID: 948ee51c624fe98c9056840df44958d3f110f291e7eeb13a77c9f6c50528b75f
                            • Instruction ID: 210192a7601cd99409c426d56dfac4e8df60f1af96207b6eb293af60208c7bc2
                            • Opcode Fuzzy Hash: 948ee51c624fe98c9056840df44958d3f110f291e7eeb13a77c9f6c50528b75f
                            • Instruction Fuzzy Hash: 4E31B17280030ABBDF11AFA5DC469AF7B69AF08325F10425EF81056291DF39CD11DB69
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free
                            • String ID: pF$tF
                            • API String ID: 269201875-2954683558
                            • Opcode ID: 7dfb1ac3d5b365181f4c44670fb8630983d2fe278c740358833edae3060cfa76
                            • Instruction ID: 6443803da38cddfc03973e112e1470be20db66c409a4168417c9ccfa39c85508
                            • Opcode Fuzzy Hash: 7dfb1ac3d5b365181f4c44670fb8630983d2fe278c740358833edae3060cfa76
                            • Instruction Fuzzy Hash: 1261D5B5D00205AFEB20CF69C841BAABBF4EF05B14F15416BE944EB381E7749D41DB58
                            APIs
                            • SetEvent.KERNEL32(?,?), ref: 0040549F
                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040554F
                            • TranslateMessage.USER32(?), ref: 0040555E
                            • DispatchMessageA.USER32(?), ref: 00405569
                            • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00471F10), ref: 00405621
                            • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405659
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Message$Heap$CreateDispatchEventFreeTranslate
                            • String ID: CloseChat$DisplayMessage$GetMessage
                            • API String ID: 2460878853-749203953
                            • Opcode ID: 262de8173bbed30a7587b1deded266ecb6d4b9a9846b8ab863609215eb828e05
                            • Instruction ID: 0f013d79663c92f7c21c274702d2b8200e9ba5951f20e13ff122dbd33ecc2bba
                            • Opcode Fuzzy Hash: 262de8173bbed30a7587b1deded266ecb6d4b9a9846b8ab863609215eb828e05
                            • Instruction Fuzzy Hash: 8B41C471A043016BCB00FB75DC5A86F77A9EB85714B40093EF946A31D2EF79C905CB9A
                            APIs
                            • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 00406775
                            • ExitProcess.KERNEL32 ref: 00406782
                            Strings
                            • H"G, xrefs: 004066E8
                            • C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe, xrefs: 00406730
                            • origmsc, xrefs: 00406710
                            • eventvwr.exe, xrefs: 0040674F
                            • Software\Classes\mscfile\shell\open\command, xrefs: 0040673F
                            • mscfile\shell\open\command, xrefs: 004066D4
                            • open, xrefs: 0040676E
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExecuteExitProcessShell
                            • String ID: C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe$H"G$Software\Classes\mscfile\shell\open\command$eventvwr.exe$mscfile\shell\open\command$open$origmsc
                            • API String ID: 1124553745-1008397301
                            • Opcode ID: 9cd949536061c79966ad2736dff7ac423f1f6417821069a7de7ae4cd9236a71f
                            • Instruction ID: 062031feec86e4e4641db6525c6f69cb17b792298443eef288e26788f9a4eac4
                            • Opcode Fuzzy Hash: 9cd949536061c79966ad2736dff7ac423f1f6417821069a7de7ae4cd9236a71f
                            • Instruction Fuzzy Hash: 36110571A4420166D704B7A2DC57FEF32689B10B09F50003FF906B61D2EEBC5A4982DE
                            APIs
                            • AllocConsole.KERNEL32(00000001), ref: 0041AA5D
                            • GetConsoleWindow.KERNEL32 ref: 0041AA63
                            • ShowWindow.USER32(00000000,00000000), ref: 0041AA76
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ConsoleWindow$AllocShow
                            • String ID: * BreakingSecurity.net$ * Remcos v$--------------------------$--------------------------$3.8.0 Pro$CONOUT$
                            • API String ID: 3461962499-4025029772
                            • Opcode ID: bb5842c9276b924b84f2b7f99c8538917f0848a2b2f901183b5b0da883229c56
                            • Instruction ID: 07661f9972e693547954b0fc743ee20e91627884e026026f5b86345d1a8b50cd
                            • Opcode Fuzzy Hash: bb5842c9276b924b84f2b7f99c8538917f0848a2b2f901183b5b0da883229c56
                            • Instruction Fuzzy Hash: CE015271D803586ADB10EBF59C06FDF77AC6B18708F54142BB100A7095E7FC950C4A2D
                            APIs
                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041843C,00000000), ref: 00418AD2
                            • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041843C,00000000), ref: 00418AE9
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418AF6
                            • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041843C,00000000), ref: 00418B05
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418B16
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418B19
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Service$CloseHandle$Open$ControlManager
                            • String ID:
                            • API String ID: 221034970-0
                            • Opcode ID: c43c0efbf1c7785281d6f20f7d6db9af9847eaec0a277ab5b5550fdeb31cbd7f
                            • Instruction ID: 27c4ffebcf7932a5624e60d5a3802e7503a1161fac6a42b5cc64803f4be6ae02
                            • Opcode Fuzzy Hash: c43c0efbf1c7785281d6f20f7d6db9af9847eaec0a277ab5b5550fdeb31cbd7f
                            • Instruction Fuzzy Hash: A211E9715002186FD610EF64DC89CFF3B6CDF41B96741012AFA0593192DF789D469AF5
                            APIs
                            • _free.LIBCMT ref: 00445645
                              • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                              • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                            • _free.LIBCMT ref: 00445651
                            • _free.LIBCMT ref: 0044565C
                            • _free.LIBCMT ref: 00445667
                            • _free.LIBCMT ref: 00445672
                            • _free.LIBCMT ref: 0044567D
                            • _free.LIBCMT ref: 00445688
                            • _free.LIBCMT ref: 00445693
                            • _free.LIBCMT ref: 0044569E
                            • _free.LIBCMT ref: 004456AC
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast
                            • String ID:
                            • API String ID: 776569668-0
                            • Opcode ID: 93d31162751b94c5375648fc1d7c6d5428524314512021667e8ac2086323d142
                            • Instruction ID: 08dc7793ba969bb8ae61e50cce6790fa76a3b05f45cdd3d63b195ce4761959f1
                            • Opcode Fuzzy Hash: 93d31162751b94c5375648fc1d7c6d5428524314512021667e8ac2086323d142
                            • Instruction Fuzzy Hash: A511CB7610010CBFDB01EF55C986CDD3B65FF04759B4284AAFA885F222EA35DF509B88
                            APIs
                            • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041A43B
                            • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041A47F
                            • RegCloseKey.ADVAPI32(?), ref: 0041A749
                            Strings
                            • DisplayName, xrefs: 0041A4C6
                            • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 0041A431
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseEnumOpen
                            • String ID: DisplayName$Software\Microsoft\Windows\CurrentVersion\Uninstall
                            • API String ID: 1332880857-3614651759
                            • Opcode ID: ba4f1eeef1759862b5ceabafa4e5b475be1264c8e7184345591224d3a7f66f42
                            • Instruction ID: 699f57f5c891f1d806a7f6c627c3d9f808e7165cae3c76f1f7c8ebce292c0808
                            • Opcode Fuzzy Hash: ba4f1eeef1759862b5ceabafa4e5b475be1264c8e7184345591224d3a7f66f42
                            • Instruction Fuzzy Hash: BC8152311183419BC328EB51D891EEFB7E8EF94348F10493FF586921E2EF749949CA5A
                            APIs
                            • __EH_prolog.LIBCMT ref: 00417F6F
                            • GdiplusStartup.GDIPLUS(00471668,?,00000000), ref: 00417FA1
                            • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041802D
                            • Sleep.KERNEL32(000003E8), ref: 004180B3
                            • GetLocalTime.KERNEL32(?), ref: 004180BB
                            • Sleep.KERNEL32(00000000,00000018,00000000), ref: 004181AA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                            • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                            • API String ID: 489098229-3790400642
                            • Opcode ID: 3bfeb6d64ff303dee52e06d6ef80bae9dddc2a42068b5f4a141a8c124fbd3d6d
                            • Instruction ID: ff50de85f816598f14f139fcbfe24147e98e2bb745fd097185ef2e944e73ca26
                            • Opcode Fuzzy Hash: 3bfeb6d64ff303dee52e06d6ef80bae9dddc2a42068b5f4a141a8c124fbd3d6d
                            • Instruction Fuzzy Hash: 98516071A001549BCB04BBB5C8529FD76A8AF55308F04403FF805A71E2EF7C5E85C799
                            APIs
                            • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00415A1A
                              • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                            • Sleep.KERNEL32(00000064), ref: 00415A46
                            • DeleteFileW.KERNEL32(00000000), ref: 00415A7A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$CreateDeleteExecuteShellSleep
                            • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                            • API String ID: 1462127192-2001430897
                            • Opcode ID: 5b288f73438ddd91382384f5f12bc16601cb2d3d8b1ec09533eac51f2f979582
                            • Instruction ID: 7fbd65b43d39327dc9f625a99f058064c4c6325298edc9245ab65683dcac2845
                            • Opcode Fuzzy Hash: 5b288f73438ddd91382384f5f12bc16601cb2d3d8b1ec09533eac51f2f979582
                            • Instruction Fuzzy Hash: FA315E719402199ACB04FBA1DC96DEE7768EF50308F40017FF506731E2EE785E8ACA99
                            APIs
                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041B22B
                              • Part of subcall function 0041B2C4: RegisterClassExA.USER32(00000030), ref: 0041B310
                              • Part of subcall function 0041B2C4: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041B32B
                              • Part of subcall function 0041B2C4: GetLastError.KERNEL32 ref: 0041B335
                            • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041B262
                            • lstrcpynA.KERNEL32(00471AF8,Remcos,00000080), ref: 0041B27C
                            • Shell_NotifyIconA.SHELL32(00000000,00471AE0), ref: 0041B292
                            • TranslateMessage.USER32(?), ref: 0041B29E
                            • DispatchMessageA.USER32(?), ref: 0041B2A8
                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041B2B5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                            • String ID: Remcos
                            • API String ID: 1970332568-165870891
                            • Opcode ID: 6a629144b245819b38f2933f29616ef2380529a0a937335efbac9e54df28edc4
                            • Instruction ID: 392c2ce23d615fe7cfca65c1bdf78dc563e79c4ff08160ae13be93183ad442b8
                            • Opcode Fuzzy Hash: 6a629144b245819b38f2933f29616ef2380529a0a937335efbac9e54df28edc4
                            • Instruction Fuzzy Hash: CD013971901308ABCB10DBB9ED4EEDB7BBCFB85B05F40417AF51992061D7B89489CB68
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 694ad35582159027617efb05aef66a3d5b04e60223d1b3b6b0413602b7ba056d
                            • Instruction ID: 53180985ac70b1d9c95f382170f9691aec8243d5c40cf1d2be039b65846bfc46
                            • Opcode Fuzzy Hash: 694ad35582159027617efb05aef66a3d5b04e60223d1b3b6b0413602b7ba056d
                            • Instruction Fuzzy Hash: 2DC12970D44245AFEB11DFA8D841BEEBBB0BF19304F04419AE844A7392C7798D51DB6B
                            APIs
                              • Part of subcall function 00452A89: CreateFileW.KERNEL32(00000000,00000000,?,00452E64,?,?,00000000,?,00452E64,00000000,0000000C), ref: 00452AA6
                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,FF8BC35D), ref: 00452ECF
                            • __dosmaperr.LIBCMT ref: 00452ED6
                            • GetFileType.KERNEL32(00000000), ref: 00452EE2
                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,FF8BC35D), ref: 00452EEC
                            • __dosmaperr.LIBCMT ref: 00452EF5
                            • CloseHandle.KERNEL32(00000000), ref: 00452F15
                            • CloseHandle.KERNEL32(00000000), ref: 0045305F
                            • GetLastError.KERNEL32 ref: 00453091
                            • __dosmaperr.LIBCMT ref: 00453098
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                            • String ID:
                            • API String ID: 4237864984-0
                            • Opcode ID: 474c31a6c8ccfba43807a2a750eddd9e1d52ca803bebdbe2fa86fef5e1c33935
                            • Instruction ID: def4621c7e831d5678052e1043e56ea9e2bfce8be848437acb5cac56d61a7e39
                            • Opcode Fuzzy Hash: 474c31a6c8ccfba43807a2a750eddd9e1d52ca803bebdbe2fa86fef5e1c33935
                            • Instruction Fuzzy Hash: CAA15832A101049FDF19EF68D8417AE7BB1AB0A325F14015FFC419B392DB798D1ACB5A
                            APIs
                            • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,0045123C,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 0045100F
                            • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,0045123C,00000000,00000000,?,00000001,?,?,?,?), ref: 00451092
                            • __alloca_probe_16.LIBCMT ref: 004510CA
                            • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,0045123C,?,0045123C,00000000,00000000,?,00000001,?,?,?,?), ref: 00451125
                            • __alloca_probe_16.LIBCMT ref: 00451174
                            • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,0045123C,00000000,00000000,?,00000001,?,?,?,?), ref: 0045113C
                              • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                            • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,0045123C,00000000,00000000,?,00000001,?,?,?,?), ref: 004511B8
                            • __freea.LIBCMT ref: 004511E3
                            • __freea.LIBCMT ref: 004511EF
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                            • String ID:
                            • API String ID: 201697637-0
                            • Opcode ID: 5dd519cdf614e137a58fad772f0fbbc90d71aea9dd9d09398d72cbf8dce97a11
                            • Instruction ID: 005ec385ace484c3041e352596739c7debf7d66643145b34d09858c349e559c3
                            • Opcode Fuzzy Hash: 5dd519cdf614e137a58fad772f0fbbc90d71aea9dd9d09398d72cbf8dce97a11
                            • Instruction Fuzzy Hash: C191D632E002169BDB209EA5C881BAF7BB59F09716F14025BED00E7292D72DDD89C768
                            APIs
                              • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                              • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                              • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                              • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                            • _memcmp.LIBVCRUNTIME ref: 00442935
                            • _free.LIBCMT ref: 004429A6
                            • _free.LIBCMT ref: 004429BF
                            • _free.LIBCMT ref: 004429F1
                            • _free.LIBCMT ref: 004429FA
                            • _free.LIBCMT ref: 00442A06
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$ErrorLast$_abort_memcmp
                            • String ID: C
                            • API String ID: 1679612858-1037565863
                            • Opcode ID: 0b4de82b44ea59e8747fa3c20bc7230b1bed574c57169c5712789c008706209c
                            • Instruction ID: aeaf983377083d43a1268bd0837f448671c9c2270315b144058cc99b7af0bbb4
                            • Opcode Fuzzy Hash: 0b4de82b44ea59e8747fa3c20bc7230b1bed574c57169c5712789c008706209c
                            • Instruction Fuzzy Hash: C6B14B75A01219DFEB24DF19C984AAEB7B4FF08314F5045AEE849A7350E774AE90CF44
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: tcp$udp
                            • API String ID: 0-3725065008
                            • Opcode ID: 688bcc682103751b5d6e0fc50f4ff73081394bc5db4df513150874dffde81862
                            • Instruction ID: 0146648cb9627796ba72a5075a1bb19f593c332394d5faf8ede73001e6eead87
                            • Opcode Fuzzy Hash: 688bcc682103751b5d6e0fc50f4ff73081394bc5db4df513150874dffde81862
                            • Instruction Fuzzy Hash: 0271AB306083029FDB24CF55C4456ABBBE5AB88B06F14483FF88587351DB78CE85CB8A
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Eventinet_ntoa
                            • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse
                            • API String ID: 3578746661-168337528
                            • Opcode ID: 9fa4c292fa1c6f3d55d2add0dfa32e1bd2dbf93c40d36a908a29b9f075726435
                            • Instruction ID: 6b7c77c2de925f44c7fd0444b04eaa142d1c015a05a303cede5520b91582e870
                            • Opcode Fuzzy Hash: 9fa4c292fa1c6f3d55d2add0dfa32e1bd2dbf93c40d36a908a29b9f075726435
                            • Instruction Fuzzy Hash: 1B51C671A043005BC704FB35E81AAAE36A56B85304F50453FF942972E2EFBD998987CF
                            APIs
                            • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00471E78,00462F54,?,00000000,0040708D,00000000), ref: 00406A56
                            • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,0040708D,00000000,?,?,0000000A,00000000), ref: 00406A9E
                            • CloseHandle.KERNEL32(00000000,?,00000000,0040708D,00000000,?,?,0000000A,00000000), ref: 00406ADE
                            • MoveFileW.KERNEL32(00000000,00000000), ref: 00406AFB
                            • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00406B26
                            • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00406B36
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$CloseHandle$CreateDeleteMoveWrite
                            • String ID: .part
                            • API String ID: 1511717022-3499674018
                            • Opcode ID: 9f31081cd1937cf64c5dce14da70e097221ab6ebc616b1863c494774d72ae38a
                            • Instruction ID: 678cfffe15af58d7f0b712f13b91f409224560124cae5e22a1f642ab954cf825
                            • Opcode Fuzzy Hash: 9f31081cd1937cf64c5dce14da70e097221ab6ebc616b1863c494774d72ae38a
                            • Instruction Fuzzy Hash: 183195715043519FC210FF61D8859AFB7E8EF84305F40493FB946A21E1DB78DE488B9A
                            APIs
                              • Part of subcall function 00411F91: RegOpenKeyExA.KERNELBASE(80000002,00000400,00000000,00020019,?), ref: 00411FB5
                              • Part of subcall function 00411F91: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00411FD2
                              • Part of subcall function 00411F91: RegCloseKey.KERNELBASE(?), ref: 00411FDD
                            • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040AEAC
                            • PathFileExistsA.SHLWAPI(?), ref: 0040AEB9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                            • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$P0F$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                            • API String ID: 1133728706-1451598199
                            • Opcode ID: 7d35b34a5c32c4cacedef9e57bb3c67f877bb4cbe8c78781d2c4aa2971c17524
                            • Instruction ID: 9e227284a7a69f00510d3be81dd7cde1580ac9a58a9ca8fbd928e09bf644cbd9
                            • Opcode Fuzzy Hash: 7d35b34a5c32c4cacedef9e57bb3c67f877bb4cbe8c78781d2c4aa2971c17524
                            • Instruction Fuzzy Hash: CF21B170A4020556CB00FBE2CC97DEE7368AF51348F80013FB901772D2EB795A45C6DA
                            APIs
                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042BAB6,?,?,?,00447215,00000001,00000001,?), ref: 0044701E
                            • __alloca_probe_16.LIBCMT ref: 00447056
                            • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042BAB6,?,?,?,00447215,00000001,00000001,?), ref: 004470A4
                            • __alloca_probe_16.LIBCMT ref: 0044713B
                            • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044719E
                            • __freea.LIBCMT ref: 004471AB
                              • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                            • __freea.LIBCMT ref: 004471B4
                            • __freea.LIBCMT ref: 004471D9
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                            • String ID:
                            • API String ID: 3864826663-0
                            • Opcode ID: 429851ce6ab608a1373ea908d8fe5c2358bbda3d7f1dde4b5ad8663d45493dac
                            • Instruction ID: 54c76e5b98bc3e662f405ec50a570bffd16f8396d3d33e450f7b83ec1f761fab
                            • Opcode Fuzzy Hash: 429851ce6ab608a1373ea908d8fe5c2358bbda3d7f1dde4b5ad8663d45493dac
                            • Instruction Fuzzy Hash: C051F372604216AFFB258F65CC81EAF77A9EB44754F19422EFC04D6340EB38DC4296A8
                            APIs
                            • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417982
                            • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179A3
                            • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179C3
                            • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179D7
                            • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179ED
                            • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417A0A
                            • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417A25
                            • SendInput.USER32(00000001,?,0000001C,?,00000000), ref: 00417A41
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: InputSend
                            • String ID:
                            • API String ID: 3431551938-0
                            • Opcode ID: 6aaf5890e5c1829a4f0a9f9de961f2057ca44ae286fc2f2a8f4f79c9cdb01491
                            • Instruction ID: 18205c9a4f61e0979ba7f31da2e0396e133b47f61cec1eebe1044e0c870e5742
                            • Opcode Fuzzy Hash: 6aaf5890e5c1829a4f0a9f9de961f2057ca44ae286fc2f2a8f4f79c9cdb01491
                            • Instruction Fuzzy Hash: BF3180715583086EE311CF51D941BEBBFECEF99B54F00080FF6809A191D2A696C98BA7
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlock
                            • String ID:
                            • API String ID: 2813074840-0
                            • Opcode ID: 2bae9f2806d7d86eff59d1f74a8a8bb512f0adbd6b6a02860a44f397e3b096e1
                            • Instruction ID: b342c93700c1c5b5557293b3c64df63ecfc3f94f93ee8c928ebb46f035b43356
                            • Opcode Fuzzy Hash: 2bae9f2806d7d86eff59d1f74a8a8bb512f0adbd6b6a02860a44f397e3b096e1
                            • Instruction Fuzzy Hash: 7C015E312443009BD314BF71DC596AA76A8EBE0346F81057EB94A931A3DF3899498A9A
                            APIs
                            • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,00447ECC,00453EB5,00000000,00000000,00000000,00000000,00000000), ref: 00447799
                            • __fassign.LIBCMT ref: 00447814
                            • __fassign.LIBCMT ref: 0044782F
                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 00447855
                            • WriteFile.KERNEL32(?,00000000,00000000,00447ECC,00000000,?,?,?,?,?,?,?,?,?,00447ECC,00453EB5), ref: 00447874
                            • WriteFile.KERNEL32(?,00453EB5,00000001,00447ECC,00000000,?,?,?,?,?,?,?,?,?,00447ECC,00453EB5), ref: 004478AD
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                            • String ID:
                            • API String ID: 1324828854-0
                            • Opcode ID: a748b16374f527b7a80cf69ed727348adf3f69da4df0249be72511d103bd3332
                            • Instruction ID: 74b5e8c6f427b63fe2026e60454d3d85c0c1d9029b0a2cc1a9ecb7a500eaa1fe
                            • Opcode Fuzzy Hash: a748b16374f527b7a80cf69ed727348adf3f69da4df0249be72511d103bd3332
                            • Instruction Fuzzy Hash: 32510870E042499FEB10DFA8DC85AEEBBF8EF09300F14416BE951E7291E7749941CB69
                            APIs
                            • _strftime.LIBCMT ref: 00401D30
                              • Part of subcall function 00401A4D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AB9
                            • waveInUnprepareHeader.WINMM(0046FA78,00000020,00000000,?), ref: 00401DE2
                            • waveInPrepareHeader.WINMM(0046FA78,00000020), ref: 00401E20
                            • waveInAddBuffer.WINMM(0046FA78,00000020), ref: 00401E2F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                            • String ID: %Y-%m-%d %H.%M$.wav
                            • API String ID: 3809562944-3597965672
                            • Opcode ID: 56e85467894a34748c48d0f1eb6f7913f46ef2942ef546941b50b0fa89a5bbba
                            • Instruction ID: eb6f517cf981021e41f9baa65c06222081641aa24e02a1e4c78245b08a68fc14
                            • Opcode Fuzzy Hash: 56e85467894a34748c48d0f1eb6f7913f46ef2942ef546941b50b0fa89a5bbba
                            • Instruction Fuzzy Hash: 743150315043009BC314EBA1EC56A9E77E8FB54318F50893EF599A21F2EFB49909CB5E
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0fe7a57eeb80513b7b5fe64b1e34abf19149bc3f23fae782b0bf022f83ee5f09
                            • Instruction ID: 106e2cecea33a690a52cc41c1271e31c3df1f85e8271d36c5dacef07d135bc52
                            • Opcode Fuzzy Hash: 0fe7a57eeb80513b7b5fe64b1e34abf19149bc3f23fae782b0bf022f83ee5f09
                            • Instruction Fuzzy Hash: 2C113232504214BBCB213F769C0596B7B7CDF857A7F11062BFC1583292DA38C9089269
                            APIs
                            • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00419392
                            • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 004193A8
                            • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 004193C1
                            • InternetCloseHandle.WININET(00000000), ref: 00419407
                            • InternetCloseHandle.WININET(00000000), ref: 0041940A
                            Strings
                            • http://geoplugin.net/json.gp, xrefs: 004193A2
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Internet$CloseHandleOpen$FileRead
                            • String ID: http://geoplugin.net/json.gp
                            • API String ID: 3121278467-91888290
                            • Opcode ID: 1de93e443a2e282a937f16c0ceb55f66d1fcd2319b03e24e709da9e0a2a31626
                            • Instruction ID: 9fad89c028030122b1819b6a874fefb9d729214f45c39af6bed7b2b06c6e4f32
                            • Opcode Fuzzy Hash: 1de93e443a2e282a937f16c0ceb55f66d1fcd2319b03e24e709da9e0a2a31626
                            • Instruction Fuzzy Hash: 3311C8311053126BD224EF169C59DABBF9CEF85765F40053EF905A32C1DBA8DC44C6A9
                            APIs
                              • Part of subcall function 0044DE21: _free.LIBCMT ref: 0044DE4A
                            • _free.LIBCMT ref: 0044E128
                              • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                              • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                            • _free.LIBCMT ref: 0044E133
                            • _free.LIBCMT ref: 0044E13E
                            • _free.LIBCMT ref: 0044E192
                            • _free.LIBCMT ref: 0044E19D
                            • _free.LIBCMT ref: 0044E1A8
                            • _free.LIBCMT ref: 0044E1B3
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast
                            • String ID:
                            • API String ID: 776569668-0
                            • Opcode ID: d645742a9f031bfd4c53cfe37fe00a001808073c56fe889b6c8b285726f20831
                            • Instruction ID: b65b67035ea7ffc6fe2c1778d32cb4f6cbb79ca162155871331ff7aa41bb66fd
                            • Opcode Fuzzy Hash: d645742a9f031bfd4c53cfe37fe00a001808073c56fe889b6c8b285726f20831
                            • Instruction Fuzzy Hash: 64111571940B08AAE520BFF2CC47FCBB7DC9F14708F50882EB29D6A552DA7DB6044654
                            APIs
                            • GetLastError.KERNEL32(?,?,004380F1,0043705E), ref: 00438108
                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00438116
                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043812F
                            • SetLastError.KERNEL32(00000000,?,004380F1,0043705E), ref: 00438181
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLastValue___vcrt_
                            • String ID:
                            • API String ID: 3852720340-0
                            • Opcode ID: 8fa3eba41d5dfcfa025b4cdbc1becdc984892f6557d94f52d480fd9577c81c63
                            • Instruction ID: 5a832d73688d02476ca7511e273f3515cfb573674d76dbd3fe9934521fa1a72b
                            • Opcode Fuzzy Hash: 8fa3eba41d5dfcfa025b4cdbc1becdc984892f6557d94f52d480fd9577c81c63
                            • Instruction Fuzzy Hash: F101283210C3326EAA102F767C85A1BAA94EB09779F31633FF214951E1FFA99C02550C
                            APIs
                            • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040AA1E
                            • GetLastError.KERNEL32 ref: 0040AA28
                            Strings
                            • [Chrome Cookies found, cleared!], xrefs: 0040AA4E
                            • [Chrome Cookies not found], xrefs: 0040AA42
                            • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040A9E9
                            • UserProfile, xrefs: 0040A9EE
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: DeleteErrorFileLast
                            • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                            • API String ID: 2018770650-304995407
                            • Opcode ID: 0a61cd6b6495849643311647e231b500c121e93944a07ca1c82b24e95f3714a3
                            • Instruction ID: 1f34f6daae66b163f55af04f15e1d0b60933b3567ae099988c08ef58cbd90c9e
                            • Opcode Fuzzy Hash: 0a61cd6b6495849643311647e231b500c121e93944a07ca1c82b24e95f3714a3
                            • Instruction Fuzzy Hash: 0E01F731B4020467C6047A75DD278AE77249951304B50057FF402773D2FD798915CA9F
                            APIs
                            • _free.LIBCMT ref: 00441566
                              • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                              • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                            • _free.LIBCMT ref: 00441578
                            • _free.LIBCMT ref: 0044158B
                            • _free.LIBCMT ref: 0044159C
                            • _free.LIBCMT ref: 004415AD
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast
                            • String ID: pF
                            • API String ID: 776569668-2973420481
                            • Opcode ID: dc25ad9d7c881d5a7498954b547f4469e613371529959f9048218c6a37a16c45
                            • Instruction ID: 534a9c52bd02544fd4565401bb604a6095318b382a753ef56e7f6fd0a1c42297
                            • Opcode Fuzzy Hash: dc25ad9d7c881d5a7498954b547f4469e613371529959f9048218c6a37a16c45
                            • Instruction Fuzzy Hash: 00F030B78052209BD7016F55BC864053BA0BB04B29305853BF8ADE6670FBB90A458F8E
                            APIs
                            • __allrem.LIBCMT ref: 00438A09
                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A25
                            • __allrem.LIBCMT ref: 00438A3C
                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A5A
                            • __allrem.LIBCMT ref: 00438A71
                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A8F
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                            • String ID:
                            • API String ID: 1992179935-0
                            • Opcode ID: e54fcd2a271a95563de48233a52a921a5b89548056e17f80f76cd68e5be4f8c8
                            • Instruction ID: 1db505a437643d25cad1e1ab06004ebe691486694b679651004c0d70fbe8f9c1
                            • Opcode Fuzzy Hash: e54fcd2a271a95563de48233a52a921a5b89548056e17f80f76cd68e5be4f8c8
                            • Instruction Fuzzy Hash: CD815972A007069BE724BA29CC41B6BF3E8AF49328F14512FF511D6382EF78D900875D
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: __cftoe
                            • String ID:
                            • API String ID: 4189289331-0
                            • Opcode ID: fe175afe76c71e94f48f18de2ff8b7888fd4a3d5f0ced9f470ddb34fbb41f910
                            • Instruction ID: 4563a9c63fae0d6d7f7aa9a83d474a3ec136fb2d14012502de5dff0b8c27d610
                            • Opcode Fuzzy Hash: fe175afe76c71e94f48f18de2ff8b7888fd4a3d5f0ced9f470ddb34fbb41f910
                            • Instruction Fuzzy Hash: CB510C32500205ABFB209F598E45EAF77B8EF48334FE0421FF415D6282EB79D941966C
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: __freea$__alloca_probe_16_free
                            • String ID: a/p$am/pm
                            • API String ID: 2936374016-3206640213
                            • Opcode ID: 86a94caed32ed52714acf924ceafe093e183b69c7042c505462fc06ec8b16e5d
                            • Instruction ID: 5910b70c00eb86a61931efff1dda8232d7c1eee9eff2524394b85f82b3a3e216
                            • Opcode Fuzzy Hash: 86a94caed32ed52714acf924ceafe093e183b69c7042c505462fc06ec8b16e5d
                            • Instruction Fuzzy Hash: 05D1E171900206CAFB289F68C895BBBB7B1FF85300F29415BE905AB391D73D9D81CB59
                            APIs
                            • std::_Lockit::_Lockit.LIBCPMT ref: 0040F8C4
                            • int.LIBCPMT ref: 0040F8D7
                              • Part of subcall function 0040CAE9: std::_Lockit::_Lockit.LIBCPMT ref: 0040CAFA
                              • Part of subcall function 0040CAE9: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CB14
                            • std::_Facet_Register.LIBCPMT ref: 0040F917
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 0040F920
                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040F93E
                            • __Init_thread_footer.LIBCMT ref: 0040F97F
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                            • String ID:
                            • API String ID: 3815856325-0
                            • Opcode ID: 2a92d127d0bc41b4c1399fda7f39d698b8b2f00d2b835ce3580847fe0977fe40
                            • Instruction ID: 3bb9722abb9e04fd13c8d4025e7ce1c878c76566b3017ce531706a3e1b7c3414
                            • Opcode Fuzzy Hash: 2a92d127d0bc41b4c1399fda7f39d698b8b2f00d2b835ce3580847fe0977fe40
                            • Instruction Fuzzy Hash: 90212232900104EBCB24EBA9E94699E7378AB08324F20017FF844B72D1DB389F458BD9
                            APIs
                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,00418344,00000000), ref: 00418C3E
                            • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,00418344,00000000), ref: 00418C52
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00418344,00000000), ref: 00418C5F
                            • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00418344,00000000), ref: 00418C94
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00418344,00000000), ref: 00418CA6
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00418344,00000000), ref: 00418CA9
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Service$CloseHandle$Open$ChangeConfigManager
                            • String ID:
                            • API String ID: 493672254-0
                            • Opcode ID: de625251fdb0966dd0fe602b722cfa4efd58a0a8c2be3873cbf04c67ac3ad1aa
                            • Instruction ID: 151ede47f5a01f66990efdacd58a0b59027112db6305451f0336687f4909308b
                            • Opcode Fuzzy Hash: de625251fdb0966dd0fe602b722cfa4efd58a0a8c2be3873cbf04c67ac3ad1aa
                            • Instruction Fuzzy Hash: A20149711862183AE6108B389C4EEBB3A6CDB42771F14032FF925A32D1EE68CD4185F9
                            APIs
                            • GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                            • _free.LIBCMT ref: 0044575C
                            • _free.LIBCMT ref: 00445784
                            • SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 00445791
                            • SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                            • _abort.LIBCMT ref: 004457A3
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast$_free$_abort
                            • String ID:
                            • API String ID: 3160817290-0
                            • Opcode ID: 2164e89f114e7cf86b97a0d05c6cee2e89ce7be6ffa074a4cf04242e0fee9013
                            • Instruction ID: 2afc6a99b93033dbed13f8def56e2284daf42193b39b630cfab03248b002a5f8
                            • Opcode Fuzzy Hash: 2164e89f114e7cf86b97a0d05c6cee2e89ce7be6ffa074a4cf04242e0fee9013
                            • Instruction Fuzzy Hash: 6EF0FE35100F0067FA117B367C8AB2F1A695FC2B2AF21013BF419D6293EE3DC902452D
                            APIs
                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,004185D9,00000000), ref: 00418A6B
                            • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,004185D9,00000000), ref: 00418A7F
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418A8C
                            • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,004185D9,00000000), ref: 00418A9B
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418AAD
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418AB0
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Service$CloseHandle$Open$ControlManager
                            • String ID:
                            • API String ID: 221034970-0
                            • Opcode ID: b7b69ea1573c73a9e6f41028e4c49f338adc93ff7086ca8506b44a1cd4c8c3a5
                            • Instruction ID: 4afe7732e2fa81f36ccf108e41ed7890102f29a09d0e479adccf976045b68e04
                            • Opcode Fuzzy Hash: b7b69ea1573c73a9e6f41028e4c49f338adc93ff7086ca8506b44a1cd4c8c3a5
                            • Instruction Fuzzy Hash: A4F0C2315013186BD210EBA5DC89EBF3BACDF45B96B41002BFD0993192DF38CD4689E9
                            APIs
                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,00418559,00000000), ref: 00418B6F
                            • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00418559,00000000), ref: 00418B83
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00418559,00000000), ref: 00418B90
                            • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,00418559,00000000), ref: 00418B9F
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00418559,00000000), ref: 00418BB1
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00418559,00000000), ref: 00418BB4
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Service$CloseHandle$Open$ControlManager
                            • String ID:
                            • API String ID: 221034970-0
                            • Opcode ID: 9eb75cef1d4b67f2c10078b5b548f78349300c808b5f133cf6c8f4936e13ccb2
                            • Instruction ID: 20460b91a854b5e3c53015269073f2e928c2deccd9acf6b4d89527a320d4dccf
                            • Opcode Fuzzy Hash: 9eb75cef1d4b67f2c10078b5b548f78349300c808b5f133cf6c8f4936e13ccb2
                            • Instruction Fuzzy Hash: 22F0C2715402186BD210EB65DC89EBF3BACDB45B52B81006AFE09A3192DE38DD4589E9
                            APIs
                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,004184D9,00000000), ref: 00418BD6
                            • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,004184D9,00000000), ref: 00418BEA
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004184D9,00000000), ref: 00418BF7
                            • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,004184D9,00000000), ref: 00418C06
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004184D9,00000000), ref: 00418C18
                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004184D9,00000000), ref: 00418C1B
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Service$CloseHandle$Open$ControlManager
                            • String ID:
                            • API String ID: 221034970-0
                            • Opcode ID: e85613c70ade42cc09a5e29631bc5df2b55fc78627f717a2ce68a963f994c174
                            • Instruction ID: 1da220ff3ffe1d32b0df5c47a21bcd1adf2661b27de4fa42f8fed5365a22baa8
                            • Opcode Fuzzy Hash: e85613c70ade42cc09a5e29631bc5df2b55fc78627f717a2ce68a963f994c174
                            • Instruction Fuzzy Hash: 32F0C2715012186BD210EB65EC89DBF3BACDB45B51B41002AFE0993192DF38CD4589F9
                            APIs
                            • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe,00000104), ref: 00440975
                            • _free.LIBCMT ref: 00440A40
                            • _free.LIBCMT ref: 00440A4A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$FileModuleName
                            • String ID: 'J$C:\Users\user\Desktop\1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741cea5c331.dat-decoded.exe
                            • API String ID: 2506810119-4043336602
                            • Opcode ID: 85438adf96173c680659750e247b8861d1a9ea07739a925f85de7b4b5d9254a8
                            • Instruction ID: d1e15b597fe779666310b40bee8bd10d15f5dfa451d6ac01ff045fbeec250af7
                            • Opcode Fuzzy Hash: 85438adf96173c680659750e247b8861d1a9ea07739a925f85de7b4b5d9254a8
                            • Instruction Fuzzy Hash: CA31C4B1A00318AFEB21DF99D88199EBBF8EF84314F10406BF544A7311E6B48E55CB59
                            APIs
                            • RegisterClassExA.USER32(00000030), ref: 0041B310
                            • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041B32B
                            • GetLastError.KERNEL32 ref: 0041B335
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ClassCreateErrorLastRegisterWindow
                            • String ID: 0$MsgWindowClass
                            • API String ID: 2877667751-2410386613
                            • Opcode ID: 98acc1d12319c165810c3a8101ac83cded611685f47401b5bc5866d6e0782eef
                            • Instruction ID: 33db8f89e50e9671cec9701a72200cc03bcb20702a276687bfdd99081a41ce18
                            • Opcode Fuzzy Hash: 98acc1d12319c165810c3a8101ac83cded611685f47401b5bc5866d6e0782eef
                            • Instruction Fuzzy Hash: 1F0125B190031CABDB10DFE5EC849EFBBBCFB08355F40052AF810A2250E77599048AA4
                            APIs
                            • ___BuildCatchObject.LIBVCRUNTIME ref: 0043761A
                              • Part of subcall function 00437C52: ___AdjustPointer.LIBCMT ref: 00437C9C
                            • _UnwindNestedFrames.LIBCMT ref: 00437631
                            • ___FrameUnwindToState.LIBVCRUNTIME ref: 00437643
                            • CallCatchBlock.LIBVCRUNTIME ref: 00437667
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                            • String ID: /zC
                            • API String ID: 2633735394-4132788633
                            • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                            • Instruction ID: d669bc69f5b2d8c9fbf55978af89ff33433ac2085b506f133949dc977f569c90
                            • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                            • Instruction Fuzzy Hash: 44012D72004508BBCF225F56CC42EDA3BBAEF4C764F15501AFA9861220C33AE861DF98
                            APIs
                            • GetSystemMetrics.USER32(0000004C), ref: 004173AA
                            • GetSystemMetrics.USER32(0000004D), ref: 004173B0
                            • GetSystemMetrics.USER32(0000004E), ref: 004173B6
                            • GetSystemMetrics.USER32(0000004F), ref: 004173BC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: MetricsSystem
                            • String ID: ]tA
                            • API String ID: 4116985748-3517819141
                            • Opcode ID: 812a9219b2c6697e1b7e6c0967c7113de32af3875f372bd592213eda7148f6bd
                            • Instruction ID: 3cbdadbf3de93f5eefc1923f71e525f4be7d9c38d0567e5d5edaddbebabc810f
                            • Opcode Fuzzy Hash: 812a9219b2c6697e1b7e6c0967c7113de32af3875f372bd592213eda7148f6bd
                            • Instruction Fuzzy Hash: 64F0AFB1B043254BD700EA7A8C41A6FAAE59BD4274F11443FFA09C7282EEB8DC458B94
                            APIs
                            • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?,?,?,?,?,00000000,00471FFC), ref: 0040E547
                            • CloseHandle.KERNEL32(?,?,?,?,?,00000000,00471FFC), ref: 0040E556
                            • CloseHandle.KERNEL32(?,?,?,?,?,00000000,00471FFC), ref: 0040E55B
                            Strings
                            • C:\Windows\System32\cmd.exe, xrefs: 0040E542
                            • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 0040E53D
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseHandle$CreateProcess
                            • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                            • API String ID: 2922976086-4183131282
                            • Opcode ID: 0b970088cbc172ce3b0f8ed072908de03e6d7713b03aec3cda7e5915f8f0f445
                            • Instruction ID: 9c8cd13d2f2f5b55d8ef3643fb71004f418ed3317f879fdff7c1c4061e2abca7
                            • Opcode Fuzzy Hash: 0b970088cbc172ce3b0f8ed072908de03e6d7713b03aec3cda7e5915f8f0f445
                            • Instruction Fuzzy Hash: 1AF06276D0029C7ACB20AAD7AC0DEDF7F3CEBC6B11F00005AB504A2050D5746540CAB5
                            APIs
                            • RegCreateKeyW.ADVAPI32(80000001,00000000,?), ref: 0041220F
                            • RegSetValueExW.ADVAPI32(00472200,00000000,00000000,?,00000000,00000000,00472200,?,?,00000001), ref: 0041223E
                            • RegCloseKey.ADVAPI32(?,?,?,00000001), ref: 00412249
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseCreateValue
                            • String ID: XIK$pth_unenc
                            • API String ID: 1818849710-1422026350
                            • Opcode ID: 9a02877a10190b6426cbfd8bde816d16f795bd4c81ace352a3103f59058ff894
                            • Instruction ID: 05e6d75f170e8ecdfe9b8062019ada1801530107581382ed9d20477649f1572c
                            • Opcode Fuzzy Hash: 9a02877a10190b6426cbfd8bde816d16f795bd4c81ace352a3103f59058ff894
                            • Instruction Fuzzy Hash: A1F0AF71440218BBCF00DFA1ED45AEE376CEF44755F00816ABC05A61A1E63A9E14DA94
                            APIs
                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,004407EB,?,?,0044078B,?), ref: 0044085A
                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044086D
                            • FreeLibrary.KERNEL32(00000000,?,?,?,004407EB,?,?,0044078B,?), ref: 00440890
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: AddressFreeHandleLibraryModuleProc
                            • String ID: CorExitProcess$mscoree.dll
                            • API String ID: 4061214504-1276376045
                            • Opcode ID: cfbbdf30ec96b6666769d195f1efe458a00f065bb439fa98bb073361271b6784
                            • Instruction ID: 0a8d3f567fe41ef9be558500660f8c42ae883db5e601ee7dbbda2c1d2cd30ed9
                            • Opcode Fuzzy Hash: cfbbdf30ec96b6666769d195f1efe458a00f065bb439fa98bb073361271b6784
                            • Instruction Fuzzy Hash: EAF0A431900618BBDB10AF61DC09BAEBFB4DB04756F510275F905A2261CB74CE54CA98
                            APIs
                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405100
                            • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E5A,00000001), ref: 0040510C
                            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E5A,00000001), ref: 00405117
                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E5A,00000001), ref: 00405120
                              • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                            Strings
                            • Connection KeepAlive | Disabled, xrefs: 004050D9
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                            • String ID: Connection KeepAlive | Disabled
                            • API String ID: 2993684571-3818284553
                            • Opcode ID: 4a255669a7b4c14ef842559232f525da28a9eda0faf2035cec84cec7ea83ecf5
                            • Instruction ID: 9f72672606b7a98fb4f6c5586ee23e87f0057564a74405461857646c77684129
                            • Opcode Fuzzy Hash: 4a255669a7b4c14ef842559232f525da28a9eda0faf2035cec84cec7ea83ecf5
                            • Instruction Fuzzy Hash: 73F09671D047007FEB1037759D0AA6B7F98DB02315F44096EF882526E1D5B988509B5A
                            APIs
                              • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                            • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 00418DA8
                            • PlaySoundW.WINMM(00000000,00000000), ref: 00418DB6
                            • Sleep.KERNEL32(00002710), ref: 00418DBD
                            • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 00418DC6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: PlaySound$HandleLocalModuleSleepTime
                            • String ID: Alarm triggered
                            • API String ID: 614609389-2816303416
                            • Opcode ID: 5fd2147961172c793483164682d526a6ae8659ed9ea9cff09775d5c3c1313662
                            • Instruction ID: 312fa8acbc24107594bc9953998d05cc744500d2263fe9839a2dc32143519282
                            • Opcode Fuzzy Hash: 5fd2147961172c793483164682d526a6ae8659ed9ea9cff09775d5c3c1313662
                            • Instruction Fuzzy Hash: 9EE01226E4026037A510376A6D0FC6F2D2DDBD3B6274501AFFA04571D2D9A4080186FF
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 675a2b2e16e95726d0081b70f545144743ae2c0fe8ff8d83379613ee76e05ba8
                            • Instruction ID: 08a5b5d7c592992a36ca4e715a0fda7f3efcfcd9ac9fa05da90acde50f0064fb
                            • Opcode Fuzzy Hash: 675a2b2e16e95726d0081b70f545144743ae2c0fe8ff8d83379613ee76e05ba8
                            • Instruction Fuzzy Hash: C471C3319002169BCB21CF55C884BFFBB75EF99320F24622BEA5167241DB788D41CBE9
                            APIs
                              • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                            • _free.LIBCMT ref: 00442318
                            • _free.LIBCMT ref: 0044232F
                            • _free.LIBCMT ref: 0044234E
                            • _free.LIBCMT ref: 00442369
                            • _free.LIBCMT ref: 00442380
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$AllocateHeap
                            • String ID:
                            • API String ID: 3033488037-0
                            • Opcode ID: bba606fc377604b84075189b83cc930c3fba5f0d417d2f8c667cfcff3c73436f
                            • Instruction ID: f6524bd8b7bf53f5b45239f2df66d8239dbe938cd5ee0330fa6954bf91cd2c46
                            • Opcode Fuzzy Hash: bba606fc377604b84075189b83cc930c3fba5f0d417d2f8c667cfcff3c73436f
                            • Instruction Fuzzy Hash: 2951C331A00704AFEB20DF6AC941A6A77F4FF49724F54466EF809DB250E7B9DA018B48
                            APIs
                            • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045C1E4), ref: 004468FE
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F754,000000FF,00000000,0000003F,00000000,?,?), ref: 00446976
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F7A8,000000FF,?,0000003F,00000000,?), ref: 004469A3
                            • _free.LIBCMT ref: 004468EC
                              • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                              • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                            • _free.LIBCMT ref: 00446AB8
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                            • String ID:
                            • API String ID: 1286116820-0
                            • Opcode ID: 13e783ce7238224165918a71ff61bbb040dde026da6db54b448d3cbd4e0f0125
                            • Instruction ID: 7fd05a225221f517daf6149bd07272def0d2f8fc9e30777fa7538f83a84e5ba5
                            • Opcode Fuzzy Hash: 13e783ce7238224165918a71ff61bbb040dde026da6db54b448d3cbd4e0f0125
                            • Instruction Fuzzy Hash: 63511DB1900205ABEB10EF65DC8196A77BCEF42714B12027FE454A7291EBB89E44CB5E
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free
                            • String ID:
                            • API String ID: 269201875-0
                            • Opcode ID: 76d0ae20e321c1f8d33a0e61d3fd8decc26b720c3d8a788f20ca92602b864a36
                            • Instruction ID: cd63c3b426f476a3995244c06b7e284d95fcad26de8669326c9f329b52a78418
                            • Opcode Fuzzy Hash: 76d0ae20e321c1f8d33a0e61d3fd8decc26b720c3d8a788f20ca92602b864a36
                            • Instruction Fuzzy Hash: AE41E132E002049FEB10DF79C981A5EB3F5EF88718F1585AAE915EB351EA74AD41CB84
                            APIs
                            • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042BAB6,?,?,?,00000001,00000000,?,00000001,0042BAB6,0042BAB6), ref: 0044E359
                            • __alloca_probe_16.LIBCMT ref: 0044E391
                            • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042BAB6,?,?,?,00000001,00000000,?,00000001,0042BAB6,0042BAB6,?), ref: 0044E3E2
                            • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042BAB6,0042BAB6,?,00000002,00000000), ref: 0044E3F4
                            • __freea.LIBCMT ref: 0044E3FD
                              • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                            • String ID:
                            • API String ID: 313313983-0
                            • Opcode ID: 9dc6cc1fdef4dc270a754d83214cf98ce3b1f09711057b0210b2fe42f7f24333
                            • Instruction ID: e15509fa74df4b182af5404410fa86f763612774b1e54c01db9847f8ec559460
                            • Opcode Fuzzy Hash: 9dc6cc1fdef4dc270a754d83214cf98ce3b1f09711057b0210b2fe42f7f24333
                            • Instruction Fuzzy Hash: BC31D232A0021AABEF259F66DC45DAF7BA5EF40710F05016AFC04DB291EB39DD51CB98
                            APIs
                              • Part of subcall function 004120E8: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,00472200), ref: 00412104
                              • Part of subcall function 004120E8: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041211D
                              • Part of subcall function 004120E8: RegCloseKey.ADVAPI32(00000000), ref: 00412128
                            • Sleep.KERNEL32(00000BB8), ref: 004111DF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseOpenQuerySleepValue
                            • String ID: H"G$Rmc$XIK$exepath
                            • API String ID: 4119054056-164337743
                            • Opcode ID: d13d1d5329077cfa18044a757332e06282965170fa37c232c78877da1bb7f387
                            • Instruction ID: cc1704131a0fe244d5c58522e2247ad29464f3afd50ace533094a5add093a815
                            • Opcode Fuzzy Hash: d13d1d5329077cfa18044a757332e06282965170fa37c232c78877da1bb7f387
                            • Instruction Fuzzy Hash: 2321F7A1B0030426DA00B7765D56AAF724D8B84308F00447FBE46F72E3DEBC9D0981AD
                            APIs
                            • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BD9
                            • waveInOpen.WINMM(0046FAB0,000000FF,0046FA98,Function_00001CEB,00000000,00000000,00000024), ref: 00401C6F
                            • waveInPrepareHeader.WINMM(0046FA78,00000020), ref: 00401CC3
                            • waveInAddBuffer.WINMM(0046FA78,00000020), ref: 00401CD2
                            • waveInStart.WINMM ref: 00401CDE
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                            • String ID:
                            • API String ID: 1356121797-0
                            • Opcode ID: 3447fdb9ff269e9e53364b21b500d15ff6263fd99ebe497e903e33a248139b70
                            • Instruction ID: fb7f9cdbf736b3995f9a1dd050f0e4013ef0d97c015e7d4644af59ef24d86031
                            • Opcode Fuzzy Hash: 3447fdb9ff269e9e53364b21b500d15ff6263fd99ebe497e903e33a248139b70
                            • Instruction Fuzzy Hash: 77212C326242019BC7049FEABD0591A7BA9FB89714740943BF58DD7AB1FBF844098B0E
                            APIs
                            • GetEnvironmentStringsW.KERNEL32 ref: 0044C543
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044C566
                              • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044C58C
                            • _free.LIBCMT ref: 0044C59F
                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044C5AE
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                            • String ID:
                            • API String ID: 336800556-0
                            • Opcode ID: 825181044c3797c199998a294b9de2a6dd0a27ea62f95a6f222d210b691a6f07
                            • Instruction ID: 9106a42af1dcf347f359e8079d91fbce8cfabd6158495d04cb7d137736bc8ec9
                            • Opcode Fuzzy Hash: 825181044c3797c199998a294b9de2a6dd0a27ea62f95a6f222d210b691a6f07
                            • Instruction Fuzzy Hash: AD0171726037257F37611AA75CC8C7F7A6DDAC6BA5319016BB904C3201EA79EE0181B8
                            APIs
                            • std::_Lockit::_Lockit.LIBCPMT ref: 0040FBD5
                            • int.LIBCPMT ref: 0040FBE8
                              • Part of subcall function 0040CAE9: std::_Lockit::_Lockit.LIBCPMT ref: 0040CAFA
                              • Part of subcall function 0040CAE9: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CB14
                            • std::_Facet_Register.LIBCPMT ref: 0040FC28
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FC31
                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FC4F
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                            • String ID:
                            • API String ID: 2536120697-0
                            • Opcode ID: 32d331dee3c396e979eb1c936d77adf0263c25033da8a89480af8e78189b82f1
                            • Instruction ID: 5713401f36b8bb0c26d90e6cd89a0375aabf3697ea4116ccadb9116029d1f595
                            • Opcode Fuzzy Hash: 32d331dee3c396e979eb1c936d77adf0263c25033da8a89480af8e78189b82f1
                            • Instruction Fuzzy Hash: 9811C172904118A7CB24EFA5D80289FB778EF44325F10417FFD44B7291DA389E4A87D8
                            APIs
                            • GetLastError.KERNEL32(?,00000000,00000000,00439A11,00000000,00000000,?,00439A95,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 004457AE
                            • _free.LIBCMT ref: 004457E3
                            • _free.LIBCMT ref: 0044580A
                            • SetLastError.KERNEL32(00000000,?,004050E3), ref: 00445817
                            • SetLastError.KERNEL32(00000000,?,004050E3), ref: 00445820
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast$_free
                            • String ID:
                            • API String ID: 3170660625-0
                            • Opcode ID: d4e383c12478905910161cad80a238fc5d6e44a6254b0909f9091c4c9b8107c1
                            • Instruction ID: 04032910ca93e9be015006ee1c204adc37b37130fda50a8933af11b0a5b4c0b1
                            • Opcode Fuzzy Hash: d4e383c12478905910161cad80a238fc5d6e44a6254b0909f9091c4c9b8107c1
                            • Instruction Fuzzy Hash: 4101FE36100F0077FB127B366CC992B15699FC2B7AB21413BF40592293EE7DCC01462D
                            APIs
                            • _free.LIBCMT ref: 0044DBB4
                              • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                              • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                            • _free.LIBCMT ref: 0044DBC6
                            • _free.LIBCMT ref: 0044DBD8
                            • _free.LIBCMT ref: 0044DBEA
                            • _free.LIBCMT ref: 0044DBFC
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$ErrorFreeHeapLast
                            • String ID:
                            • API String ID: 776569668-0
                            • Opcode ID: 4ff6445dbd1c139c6c118283ff3a35b6f69cd7d79671e775af14f987f4430014
                            • Instruction ID: 294e589d6328203d0d12509a579114aacc3179ef351d8ef0a61016021d4f39e6
                            • Opcode Fuzzy Hash: 4ff6445dbd1c139c6c118283ff3a35b6f69cd7d79671e775af14f987f4430014
                            • Instruction Fuzzy Hash: DDF04F339002146BA620EF6AE9C6C5773D9EE01B15355880AF085E7600EA78FC80965C
                            APIs
                            • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 004124AD
                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 004124DC
                            • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 0041257C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Enum$InfoQueryValue
                            • String ID: [regsplt]
                            • API String ID: 3554306468-4262303796
                            • Opcode ID: 8708e01ee449fd305a71b4056e7db3d63c1d920d9917d504d40d245cf41daf0f
                            • Instruction ID: d2130986b24ed572c5287744f6969716810a156cba9fb87d3bcc7fef363a21f2
                            • Opcode Fuzzy Hash: 8708e01ee449fd305a71b4056e7db3d63c1d920d9917d504d40d245cf41daf0f
                            • Instruction Fuzzy Hash: A6513C71900219AADB10EBA1DD81EEFB7BDEF04304F10016AF505F2191EF786B49CBA8
                            APIs
                            • _strpbrk.LIBCMT ref: 0044B918
                            • _free.LIBCMT ref: 0044BA35
                              • Part of subcall function 00439AA3: IsProcessorFeaturePresent.KERNEL32(00000017,00439A75,004050E3,?,00000000,00000000,00402086,00000000,00000000,?,00439A95,00000000,00000000,00000000,00000000,00000000), ref: 00439AA5
                              • Part of subcall function 00439AA3: GetCurrentProcess.KERNEL32(C0000417,?,004050E3), ref: 00439AC7
                              • Part of subcall function 00439AA3: TerminateProcess.KERNEL32(00000000,?,004050E3), ref: 00439ACE
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                            • String ID: *?$.
                            • API String ID: 2812119850-3972193922
                            • Opcode ID: 5dfc5c04e88bff774400eef92f9a188e96d7e5ade9dca766e11bbcc0c0b71fd5
                            • Instruction ID: d7c010aeaec7a8a897f36992f2f7f2874d2ac4fe7d304ea8792e53e8e447d7e7
                            • Opcode Fuzzy Hash: 5dfc5c04e88bff774400eef92f9a188e96d7e5ade9dca766e11bbcc0c0b71fd5
                            • Instruction Fuzzy Hash: 9C51C371E002099FEF14DFA9C881AAEB7B5EF48314F24816EE954E7301E779DE018B94
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: __alloca_probe_16__freea
                            • String ID: H"G$H"GH"G
                            • API String ID: 1635606685-3036711414
                            • Opcode ID: e481662891375e5a2645b3b08f80f5967694cfef59df56efd529eea01ddaf1f5
                            • Instruction ID: 3c870ea2fb57449e7c992ce38f4d69c2eab2d9a05dd359c3c94aeedaa7d51697
                            • Opcode Fuzzy Hash: e481662891375e5a2645b3b08f80f5967694cfef59df56efd529eea01ddaf1f5
                            • Instruction Fuzzy Hash: F0411931A00212ABEB219F65CD82A5FB7A1EF45714F54056FF804DB291EBBCDD40879E
                            APIs
                            • __Init_thread_footer.LIBCMT ref: 0040189E
                            • ExitThread.KERNEL32 ref: 004018D6
                            • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00471E78,00000000), ref: 004019E4
                              • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                            • String ID: 8:G
                            • API String ID: 1649129571-405301104
                            • Opcode ID: 4811f91776abef84e782c8f1a2f26cc4c017af14a5271da8538a01cbcee2d519
                            • Instruction ID: 6b8457e9d7ea4966c0dd8dde8758560e0d74fde28bba72e74fe0511dc6260a90
                            • Opcode Fuzzy Hash: 4811f91776abef84e782c8f1a2f26cc4c017af14a5271da8538a01cbcee2d519
                            • Instruction Fuzzy Hash: 7941E7325042005BC324FB65DD86EAFB3A9AB84318F40453FF589621F2DF78994ADB5E
                            APIs
                              • Part of subcall function 00412006: RegOpenKeyExW.ADVAPI32(80000000,http\shell\open\command,00000000,00020019,00000000,00472248,00471FFC), ref: 00412030
                              • Part of subcall function 00412006: RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,?,00000400), ref: 0041204B
                              • Part of subcall function 00412006: RegCloseKey.ADVAPI32(00000000), ref: 00412054
                              • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F34
                              • Part of subcall function 00419F23: IsWow64Process.KERNEL32(00000000,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F3B
                            • _wcslen.LIBCMT ref: 00419744
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                            • String ID: .exe$program files (x86)\$program files\
                            • API String ID: 3286818993-1203593143
                            • Opcode ID: c3d187e068c8227969fb40ba4f6d42d96da15a81f7815bea62f10487f4f34856
                            • Instruction ID: a7f24a5d9d5c0dc772ada330bc3383911e5a1e9af4e42701afe0c0cb79e45fb3
                            • Opcode Fuzzy Hash: c3d187e068c8227969fb40ba4f6d42d96da15a81f7815bea62f10487f4f34856
                            • Instruction Fuzzy Hash: CB21B872A001046BDF14BAB6DD968FE37AD9E4831CB04057FF405B32D2ED7D8D5942A9
                            APIs
                            • GetLocalTime.KERNEL32(?,004724A8,?,00000000,?,?,?,?,?,?,004146C2,?,00000001,0000004C,00000000), ref: 00405010
                              • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                            • GetLocalTime.KERNEL32(?,004724A8,?,00000000,?,?,?,?,?,?,004146C2,?,00000001,0000004C,00000000), ref: 00405067
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: LocalTime
                            • String ID: Connection KeepAlive | Enabled | Timeout: $T/F
                            • API String ID: 481472006-155447768
                            • Opcode ID: a5024f19e4cc734f5a6cec97d8bada3f0247bf1006b777bd493aeb819e948d41
                            • Instruction ID: 0beb7a88d254a358a963561f9d97893b624dd36ca90e96b80d49a5b3b1f878f3
                            • Opcode Fuzzy Hash: a5024f19e4cc734f5a6cec97d8bada3f0247bf1006b777bd493aeb819e948d41
                            • Instruction Fuzzy Hash: 092137719042406BD304B7219D2976F7794A745308F04047EF845132E2DBBD5988CB9F
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free
                            • String ID: XF$pUL
                            • API String ID: 269201875-296658581
                            • Opcode ID: cb74daebedeac94c0edd9e9a4f608c47af35d50e83ab7986da7a67bf282e73af
                            • Instruction ID: 29f128b94e4315e8473d4fe5e2203e9150e620d95e20f300bbe5d6479d49c613
                            • Opcode Fuzzy Hash: cb74daebedeac94c0edd9e9a4f608c47af35d50e83ab7986da7a67bf282e73af
                            • Instruction Fuzzy Hash: FD11B4B1A402005EE7205F2ABC45B5632946F54734F165A37F9A0EB3E0F3B8C8854B8B
                            APIs
                              • Part of subcall function 0040A0B0: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A0BE
                              • Part of subcall function 0040A0B0: wsprintfW.USER32 ref: 0040A13F
                              • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                            • CreateThread.KERNEL32(00000000,00000000,Function_000092EF,?,00000000,00000000), ref: 00409EB7
                            • CreateThread.KERNEL32(00000000,00000000,Function_00009311,?,00000000,00000000), ref: 00409EC3
                            • CreateThread.KERNEL32(00000000,00000000,0040931D,?,00000000,00000000), ref: 00409ECF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CreateThread$LocalTime$wsprintf
                            • String ID: Online Keylogger Started
                            • API String ID: 112202259-1258561607
                            • Opcode ID: 86dbd2ede10dcdaea0f387c1138916226ec1cb0004849d923c05056a418c9c0b
                            • Instruction ID: 28bbfba120e67fe9302c314101e9d6be38f8a9d2e5fa49f3fb55d6307d966583
                            • Opcode Fuzzy Hash: 86dbd2ede10dcdaea0f387c1138916226ec1cb0004849d923c05056a418c9c0b
                            • Instruction Fuzzy Hash: 7F01C4A0A042083AE62076768CD6DBF7A6CCA92398B40047FFA45221C3D9B85C5586FE
                            APIs
                            • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData,?,00000000,00406039,?), ref: 00406090
                            • GetProcAddress.KERNEL32(00000000), ref: 00406097
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: AddressLibraryLoadProc
                            • String ID: CryptUnprotectData$crypt32
                            • API String ID: 2574300362-2380590389
                            • Opcode ID: f0fa7d81e448b8e45dda707d186e5b4dbadcbde3f04206e46648964c8c5bf07c
                            • Instruction ID: 6e7317174224a8efb10ab03f2076fe60a9434866ae70ffeafd7cb5b8c28562e1
                            • Opcode Fuzzy Hash: f0fa7d81e448b8e45dda707d186e5b4dbadcbde3f04206e46648964c8c5bf07c
                            • Instruction Fuzzy Hash: C801F535A04205ABCF18CFA9D8049ABBBB8AB54300F00427FE956E3380D635D904C794
                            APIs
                            • PathFileExistsW.SHLWAPI(00000000,00000000,?,?,?,?,?,00415594,00000000), ref: 00418CF2
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExistsFilePath
                            • String ID: P0F$alarm.wav$x(G
                            • API String ID: 1174141254-3464520750
                            • Opcode ID: f63045e6336c19daf6c3054a04531fae9f0a90cffdb2b00e2009f4826bf8f39b
                            • Instruction ID: fe962266bcbe9b481af3baecc2186877703bd5259ecc619923a55b1e0e4c82aa
                            • Opcode Fuzzy Hash: f63045e6336c19daf6c3054a04531fae9f0a90cffdb2b00e2009f4826bf8f39b
                            • Instruction Fuzzy Hash: 40019270B0430056C604F7A6E9566EE37958BA1358F00857FA849672E2EEBD4D45C6CF
                            APIs
                            • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405139), ref: 00405153
                            • CloseHandle.KERNEL32(?), ref: 004051AA
                            • SetEvent.KERNEL32(?), ref: 004051B9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseEventHandleObjectSingleWait
                            • String ID: Connection Timeout
                            • API String ID: 2055531096-499159329
                            • Opcode ID: 0fe5635f683795d8cfe0579df31b5987a28acbd550c3129ce8b44c2f0693b938
                            • Instruction ID: 59ae86e236e2a5bc5991cc3fd82f69d26eb1b9a4ba12329ef82c58e56ff8d0a2
                            • Opcode Fuzzy Hash: 0fe5635f683795d8cfe0579df31b5987a28acbd550c3129ce8b44c2f0693b938
                            • Instruction Fuzzy Hash: F901F531A40F40AFE711BB368C4551B7BD4FF01302704097FE19356AA1D6B89800CF49
                            APIs
                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040D25E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Exception@8Throw
                            • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                            • API String ID: 2005118841-1866435925
                            • Opcode ID: c2bed29ba638d9f2391385ea3c87f8400cac86e7986091462376dda2deee5712
                            • Instruction ID: 5123bbd1fc4d669f1c4d6c1cc045f4f856aea5ad0ec182f95f4946492138bf11
                            • Opcode Fuzzy Hash: c2bed29ba638d9f2391385ea3c87f8400cac86e7986091462376dda2deee5712
                            • Instruction Fuzzy Hash: 0401A261E44208BAD714EAD1C853FBA73689B64705F10806FB911751C2EA7DAA4E862F
                            APIs
                            • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041487B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExecuteShell
                            • String ID: /C $cmd.exe$open
                            • API String ID: 587946157-3896048727
                            • Opcode ID: 200560daae6b7c2951921310a9a850d73dd86d63f9695ecaabf21497659b4c2f
                            • Instruction ID: 0094db9d050c86e8b7efcb7c1e993d1de0046a6f7675c6b5aa1ef49a358ded74
                            • Opcode Fuzzy Hash: 200560daae6b7c2951921310a9a850d73dd86d63f9695ecaabf21497659b4c2f
                            • Instruction Fuzzy Hash: 8FF017712083049BC304FBB5DC91DEFB39CAB90348F50493FB556921E2EE789949C65A
                            APIs
                            • RegOpenKeyExW.ADVAPI32(80000000,http\shell\open\command,00000000,00020019,00000000,00472248,00471FFC), ref: 00412030
                            • RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,?,00000400), ref: 0041204B
                            • RegCloseKey.ADVAPI32(00000000), ref: 00412054
                            Strings
                            • http\shell\open\command, xrefs: 00412026
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseOpenQueryValue
                            • String ID: http\shell\open\command
                            • API String ID: 3677997916-1487954565
                            • Opcode ID: 02d9583b321f90b8fde47cd3c5079fbeabf7c3eeeb86fcf6652fd9b53942e913
                            • Instruction ID: 0e37d8025f140bc42ec1a8b72352379eb981339daaa9ecb07b48012be1c394e8
                            • Opcode Fuzzy Hash: 02d9583b321f90b8fde47cd3c5079fbeabf7c3eeeb86fcf6652fd9b53942e913
                            • Instruction Fuzzy Hash: C5F0C271500218FBDB609B95DC49EDFBBBCEB84B12F1040A6BA04E2150DAB55F98C7A5
                            APIs
                            • std::_Lockit::_Lockit.LIBCPMT ref: 0040C9D9
                            • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040CA18
                              • Part of subcall function 004333ED: _Yarn.LIBCPMT ref: 0043340C
                              • Part of subcall function 004333ED: _Yarn.LIBCPMT ref: 00433430
                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040CA3E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                            • String ID: bad locale name
                            • API String ID: 3628047217-1405518554
                            • Opcode ID: b8ecc850591a1ec77cb11eee1f92953351954c39fd186dfa0a3b440cd31c26bd
                            • Instruction ID: 2c4ad0125759e8972babdbfe9bad97e9a7b68ba46d49635da0f31685b809246c
                            • Opcode Fuzzy Hash: b8ecc850591a1ec77cb11eee1f92953351954c39fd186dfa0a3b440cd31c26bd
                            • Instruction Fuzzy Hash: 6EF01232500604FAC328FBA6DC5299A77A49F14719F508D3FF545214D1FF396A18C699
                            APIs
                            • RegCreateKeyA.ADVAPI32(80000001,00000000,P0F), ref: 00412276
                            • RegSetValueExA.ADVAPI32(P0F,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 00412291
                            • RegCloseKey.ADVAPI32(?,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 0041229C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseCreateValue
                            • String ID: P0F
                            • API String ID: 1818849710-3540264436
                            • Opcode ID: 621f54e733439cbcd958662464d090e9ff9f63f5a417d09ab0c58a6b3b1f16b4
                            • Instruction ID: aa9041bc7d36289a95917c0f975a521a353b8518001b5fa9068edf17b8c75ad2
                            • Opcode Fuzzy Hash: 621f54e733439cbcd958662464d090e9ff9f63f5a417d09ab0c58a6b3b1f16b4
                            • Instruction Fuzzy Hash: 05E03972600308BBDB209FA09D05FEA7B6CEF04B62F1141A5BF09A6591D2758E14A7A8
                            APIs
                            • TerminateThread.KERNEL32(Function_00009305,00000000,XIK,0040BC76,?,00472200,pth_unenc,XIK), ref: 0040A801
                            • UnhookWindowsHookEx.USER32(0001043B), ref: 0040A811
                            • TerminateThread.KERNEL32(004092EF,00000000,?,00472200,pth_unenc,XIK), ref: 0040A823
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: TerminateThread$HookUnhookWindows
                            • String ID: XIK
                            • API String ID: 3123878439-1566296654
                            • Opcode ID: 8267290ba39d94e96aad68657565d8cdeaa2cc55df27e2dd61bae36986e01b15
                            • Instruction ID: 1ea45cce1470398c8d9247cd1949440ee3d7e4d102938376389503cdeb19b454
                            • Opcode Fuzzy Hash: 8267290ba39d94e96aad68657565d8cdeaa2cc55df27e2dd61bae36986e01b15
                            • Instruction Fuzzy Hash: A4E01D711443456FE3105F606DD49157B5CE6083597514875B606531B1C67CCC88CB3D
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: __alldvrm$_strrchr
                            • String ID:
                            • API String ID: 1036877536-0
                            • Opcode ID: 37a389c91fd0305d0bc5a94ad43230e35c365edb8f3973a3c9d9ada82f0d9176
                            • Instruction ID: 8a3f88530d83194aa24a517e4ef6e15a272d99a70002873db7a8ab856bdac54d
                            • Opcode Fuzzy Hash: 37a389c91fd0305d0bc5a94ad43230e35c365edb8f3973a3c9d9ada82f0d9176
                            • Instruction Fuzzy Hash: 18A12572A012869FFB21CE18C8817AEBBA1EF65314F24416FE5859B382CA3C8941C759
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free
                            • String ID:
                            • API String ID: 269201875-0
                            • Opcode ID: ee8e1cba0696e1ef76f6de9b16e819625eafbf0b8f389bd133dd680e215230cb
                            • Instruction ID: 9707d98a659f88f98630b1874925085f47dfd26ea07d7c57405a666b90b138a8
                            • Opcode Fuzzy Hash: ee8e1cba0696e1ef76f6de9b16e819625eafbf0b8f389bd133dd680e215230cb
                            • Instruction Fuzzy Hash: 69412C32A041006BDB21AFBA8C4666F3BA5DF453B7F10461FFC18D6293DB3C8E15466A
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 708417122de2711bb2eb7b93dd9c5bc77eababb27f74811c5393ad6cf28abd82
                            • Instruction ID: c1abd53b49e6a7723cad7358b49d7c046164203d86e3a19123cc85c40c5f12b7
                            • Opcode Fuzzy Hash: 708417122de2711bb2eb7b93dd9c5bc77eababb27f74811c5393ad6cf28abd82
                            • Instruction Fuzzy Hash: 93412871E00704AFD7249F79CC46B5A7BA9EB8C714F10523FF142DB681D37999498788
                            APIs
                            Strings
                            • [Cleared browsers logins and cookies.], xrefs: 0040B025
                            • Cleared browsers logins and cookies., xrefs: 0040B036
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Sleep
                            • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                            • API String ID: 3472027048-1236744412
                            • Opcode ID: 466dda640d94f9fbee3329d52ed52dd43d480b16abcd6ed764fa20ee003ba8e7
                            • Instruction ID: 9e673e540e653d5dfc9c41bfd33b173fe745421aa21f598ea7623546fa890e2b
                            • Opcode Fuzzy Hash: 466dda640d94f9fbee3329d52ed52dd43d480b16abcd6ed764fa20ee003ba8e7
                            • Instruction Fuzzy Hash: EE31A24074C3826EDA11BBB555267EF6B924A53758F0844BFF8C42B3C3D9BA4818936F
                            APIs
                              • Part of subcall function 0041A2DB: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041A2EB
                              • Part of subcall function 0041A2DB: GetWindowTextLengthW.USER32(00000000), ref: 0041A2F4
                              • Part of subcall function 0041A2DB: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041A31E
                            • Sleep.KERNEL32(000001F4), ref: 0040955A
                            • Sleep.KERNEL32(00000064), ref: 004095F5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Window$SleepText$ForegroundLength
                            • String ID: [ $ ]
                            • API String ID: 3309952895-93608704
                            • Opcode ID: f35117b26c77fa319d9cb66e8045cf75f7298dad09c70da495946e86f577ec05
                            • Instruction ID: f130b1bb1348f748448b569433b56ba5176942d51498ef551544d7c0cb15bd34
                            • Opcode Fuzzy Hash: f35117b26c77fa319d9cb66e8045cf75f7298dad09c70da495946e86f577ec05
                            • Instruction Fuzzy Hash: 2721657160420067C618B776DC179AE32A89F51308F40447FF552772D3EE7D9A05869F
                            APIs
                            • GetSystemTimes.KERNEL32(?,?,?,004724A0,?,?,00000000), ref: 004197F6
                            • Sleep.KERNEL32(000003E8,?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,0041588A), ref: 00419801
                            • GetSystemTimes.KERNEL32(?,?,?,?,?,00000000), ref: 00419816
                            • __aulldiv.LIBCMT ref: 0041987D
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: SystemTimes$Sleep__aulldiv
                            • String ID:
                            • API String ID: 188215759-0
                            • Opcode ID: a10989dffdb38c1c471ca41a2490fa3084ff35cad8f91966e756ab2f281e4d8f
                            • Instruction ID: 145d7891b6f1dee57345c91865aa58c1fa38592630094fdfab7f37f82c20bed6
                            • Opcode Fuzzy Hash: a10989dffdb38c1c471ca41a2490fa3084ff35cad8f91966e756ab2f281e4d8f
                            • Instruction Fuzzy Hash: 791160735443446BC308FAB5CC95DEB77ACEBC5388F040A3EF54682091EE39DA488BA5
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 87cf1a99992dac899311e5f70d4e339ac3b3345b823034c77296a488e3312c11
                            • Instruction ID: cddd12244c82da27d8fba5a3cfb3b4b8374ea1530061808fe1103b2c2b1f06f2
                            • Opcode Fuzzy Hash: 87cf1a99992dac899311e5f70d4e339ac3b3345b823034c77296a488e3312c11
                            • Instruction Fuzzy Hash: 46018FB26092163EF6302E796CC1F67271CDF517B9B21033BF625622D2EAB8CD254568
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0a806abc81d082e1cec901e4614177c074956c5300ea34d23f617e0004ee84c8
                            • Instruction ID: ded37596ea74bb71ca552df42b40a6491f306b500b676c7390fdbb9d5d89f826
                            • Opcode Fuzzy Hash: 0a806abc81d082e1cec901e4614177c074956c5300ea34d23f617e0004ee84c8
                            • Instruction Fuzzy Hash: E801D1B220A2163EB6202E796CC9D27631DEF513BE725033BF521522E6EF7DCC855168
                            APIs
                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,00445A3C,00000000,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue), ref: 00445AC7
                            • GetLastError.KERNEL32(?,00445A3C,00000000,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue,0045C110,0045C118,00000000,00000364,?,004457F7), ref: 00445AD3
                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00445A3C,00000000,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue,0045C110,0045C118,00000000), ref: 00445AE1
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: LibraryLoad$ErrorLast
                            • String ID:
                            • API String ID: 3177248105-0
                            • Opcode ID: 6ca79951660ad3b6e96c8c42d18b75cc874aa2905662dd76989ddfa9726cc4c5
                            • Instruction ID: dabcc1aa4f00c9d7d6140ee010913d89a9079070269616da1364236c98588597
                            • Opcode Fuzzy Hash: 6ca79951660ad3b6e96c8c42d18b75cc874aa2905662dd76989ddfa9726cc4c5
                            • Instruction Fuzzy Hash: 8501FC32601B276BDF218A78AC84D577758EF05B617110635F906E3242D724DC01C6E8
                            APIs
                            • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                            • GetFileSize.KERNEL32(00000000,00000000), ref: 0041A23C
                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041A261
                            • CloseHandle.KERNEL32(00000000), ref: 0041A26F
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: File$CloseCreateHandleReadSize
                            • String ID:
                            • API String ID: 3919263394-0
                            • Opcode ID: f1251b9d043b1816c7bddaf3ccd168bdb61cdb2151e11f70954b411bc85d9a2d
                            • Instruction ID: 89bb00dd3d40589ea0a8ab1c68f17f151e0eed20b013a8aeca2898ab58bcd068
                            • Opcode Fuzzy Hash: f1251b9d043b1816c7bddaf3ccd168bdb61cdb2151e11f70954b411bc85d9a2d
                            • Instruction Fuzzy Hash: 6EF0F6B13023087FE6102B21AC84FBF369CDB867A5F01027EF901A32C1CA3A8C054536
                            APIs
                            • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000), ref: 00419F9C
                            • GetModuleFileNameExW.PSAPI(00000000,00000000,?,00000208), ref: 00419FBE
                            • CloseHandle.KERNEL32(00000000), ref: 00419FC9
                            • CloseHandle.KERNEL32(00000000), ref: 00419FD1
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseHandle$FileModuleNameOpenProcess
                            • String ID:
                            • API String ID: 3706008839-0
                            • Opcode ID: a23d0fe8114767c15cdde0a498d95ac820affdde2608e9dac14c7f136773ffec
                            • Instruction ID: 9bf07e75ebb9e679cccba50474e497f26c5128b29002f083bca96ca2400931d7
                            • Opcode Fuzzy Hash: a23d0fe8114767c15cdde0a498d95ac820affdde2608e9dac14c7f136773ffec
                            • Instruction Fuzzy Hash: D1F0E93124031477D7A067589C0DFE7766CC790B51F100276F508D72E1DEA99C82469A
                            APIs
                            • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00436CD1
                            • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00436CD6
                            • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00436CDB
                              • Part of subcall function 004381DA: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 004381EB
                            • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00436CF0
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                            • String ID:
                            • API String ID: 1761009282-0
                            • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                            • Instruction ID: fe0629a2579d5eb29aad24ff52ac89f8c4d28ee3f0e2161d733d9faf058f7893
                            • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                            • Instruction Fuzzy Hash: 12C00254040342742C5077B622062AEA350A8AE38DFA7B4CFB892171038D0D440B953F
                            APIs
                            • __startOneArgErrorHandling.LIBCMT ref: 004401ED
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorHandling__start
                            • String ID: pow
                            • API String ID: 3213639722-2276729525
                            • Opcode ID: 28648d1c5639a1d5ffd860c5db5a803017559560979bfd47f5832c4e42ec8e44
                            • Instruction ID: 9a83a7e01686381b8a8ce0b853cf5bc52d75b03c70b61edc7fb1f4b11142e615
                            • Opcode Fuzzy Hash: 28648d1c5639a1d5ffd860c5db5a803017559560979bfd47f5832c4e42ec8e44
                            • Instruction Fuzzy Hash: 21518A60A842018AFB117714CA4137B3B90EB40701F248DABE5D2563EAEB7D8CB5DA4F
                            APIs
                            • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00412737
                              • Part of subcall function 00412446: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 004124AD
                              • Part of subcall function 00412446: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 004124DC
                            • RegCloseKey.ADVAPI32(00000000,00463050,00463050,00469654,00469654,00000071), ref: 004128A5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CloseEnumInfoOpenQuery
                            • String ID: P0F
                            • API String ID: 1014704025-3540264436
                            • Opcode ID: f4aa0fac9c7250a9c53968685f733bccf4a3c8d04a478230bfa951ca088e23b8
                            • Instruction ID: 2d28d635716c3df90d830f6dadb90dee404f775c6aa34bcd6e72966151b01206
                            • Opcode Fuzzy Hash: f4aa0fac9c7250a9c53968685f733bccf4a3c8d04a478230bfa951ca088e23b8
                            • Instruction Fuzzy Hash: 9D41F3306442405BC324F625D992AEFB299AFD1344F40893FB44A631D2EEBC5D4A86AE
                            APIs
                              • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                              • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                              • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                              • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                              • Part of subcall function 0044C257: _abort.LIBCMT ref: 0044C289
                              • Part of subcall function 0044C257: _free.LIBCMT ref: 0044C2BD
                              • Part of subcall function 0044BECC: GetOEMCP.KERNEL32(00000000,?,?,0044C155,?), ref: 0044BEF7
                            • _free.LIBCMT ref: 0044C1B0
                            • _free.LIBCMT ref: 0044C1E6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$ErrorLast_abort
                            • String ID: pF
                            • API String ID: 2991157371-2973420481
                            • Opcode ID: bab6f42d0b0ad1c45baa8cd6d2334fb0c97687a18f596a08bb1afdde7ab90e7e
                            • Instruction ID: fe15ecdc59135b682bea8f5676c8c6c36af8c828548cffef148b997f3b02a595
                            • Opcode Fuzzy Hash: bab6f42d0b0ad1c45baa8cd6d2334fb0c97687a18f596a08bb1afdde7ab90e7e
                            • Instruction Fuzzy Hash: 3431E931901104AFFB50EF9AD481B5A77F4DF40325F29409FE5149B252EB7A9D40CF48
                            APIs
                              • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                            • __Init_thread_footer.LIBCMT ref: 0040A6E3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Init_thread_footer__onexit
                            • String ID: [End of clipboard]$[Text copied to clipboard]
                            • API String ID: 1881088180-3686566968
                            • Opcode ID: 44f911444ffa7c3397639edde977d3ee6651e3735ca6fd54ab2b9edf5bc924b1
                            • Instruction ID: 89f5e7c07999504d217297f9a041c68b3e0b8c5632e5b70e4a6c966e9d45e494
                            • Opcode Fuzzy Hash: 44f911444ffa7c3397639edde977d3ee6651e3735ca6fd54ab2b9edf5bc924b1
                            • Instruction Fuzzy Hash: 42218D31A002055ACB04FBA5D892DEDB378AF54308F10453FF506771D2EF38AE4A8A8D
                            APIs
                            • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,0044EF72,?,00000050,?,?,?,?,?), ref: 0044EDF2
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: ACP$OCP
                            • API String ID: 0-711371036
                            • Opcode ID: 2f6255c43d422f9ec28f5694223862b2eeac92ff2acac738a800f64e00dd4497
                            • Instruction ID: ce4b6ecbf16ce97eee8671cf775368e41a8ae942868fb71505acbacd33d5bec2
                            • Opcode Fuzzy Hash: 2f6255c43d422f9ec28f5694223862b2eeac92ff2acac738a800f64e00dd4497
                            • Instruction Fuzzy Hash: 4F21F1E2E00102A2FB348B67CC01BAB72A6FF54B51F568426E90AD7300EB3ADD41C35C
                            APIs
                            • GetWindowTextW.USER32(?,?,0000012C), ref: 00415B2E
                            • IsWindowVisible.USER32(?), ref: 00415B37
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: Window$TextVisible
                            • String ID: (%G
                            • API String ID: 1670992164-3377777310
                            • Opcode ID: fd2ff7ff3275d3c7faaa283d4d65487a7059631aa5508a7a24a326fc3211d187
                            • Instruction ID: 7bdbcb6602ffb42e5ce2137d58ff1a132c15f169860b2e192372582f8912ca7a
                            • Opcode Fuzzy Hash: fd2ff7ff3275d3c7faaa283d4d65487a7059631aa5508a7a24a326fc3211d187
                            • Instruction Fuzzy Hash: E42166315182019BC314FB61D891EEFB7E9AF94304F50493FF49A920E2FF349A49CA5A
                            APIs
                            • @_EH4_CallFilterFunc@8.LIBCMT ref: 0043A47A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CallFilterFunc@8
                            • String ID: @F$@F
                            • API String ID: 4062629308-3436687868
                            • Opcode ID: 16cbe90923eaebb00dd39f36306d65f0abe7ab86164c1207374e317e2438dedd
                            • Instruction ID: d046661977b9f70fa2c81c6cfd40d9a104c7fef52231e330e595ae3c7a73c1ff
                            • Opcode Fuzzy Hash: 16cbe90923eaebb00dd39f36306d65f0abe7ab86164c1207374e317e2438dedd
                            • Instruction Fuzzy Hash: 2F214C3165020056D7186B799D0636F33915F5D338F28A31FF8A18B3E1E7BC8962860F
                            APIs
                            • @_EH4_CallFilterFunc@8.LIBCMT ref: 0043A8BC
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CallFilterFunc@8
                            • String ID: @F$@F
                            • API String ID: 4062629308-3436687868
                            • Opcode ID: 05b9a46a5ff75a344cafbd81f1c8e321827cbd969dec9deaf21c8b585dac50da
                            • Instruction ID: 70967ea4cb1e6682f5d06301c8bd88165fdf16009f8cb562ef1cc0c82826ef49
                            • Opcode Fuzzy Hash: 05b9a46a5ff75a344cafbd81f1c8e321827cbd969dec9deaf21c8b585dac50da
                            • Instruction Fuzzy Hash: 4C212531A5021086C71CBB799C0236E7391AF4D338F28675FF8A29A2D1E77C8953864F
                            APIs
                            • GetStdHandle.KERNEL32(000000F6), ref: 0044753C
                            • GetFileType.KERNEL32(00000000), ref: 0044754E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: FileHandleType
                            • String ID: pUL
                            • API String ID: 3000768030-320214504
                            • Opcode ID: 584d983f07588d59a80cd593781a2b5952fd179e8a6c53e317df8b7e088317fe
                            • Instruction ID: f3e64406935b1962c0d1e5831b9f441d98c156aa3d193b91852e36c68e8d9cf3
                            • Opcode Fuzzy Hash: 584d983f07588d59a80cd593781a2b5952fd179e8a6c53e317df8b7e088317fe
                            • Instruction Fuzzy Hash: 5C113A7150C7416AE7304E3D9C882237B94A756331B78072BD0B6CBAF2C738E983964E
                            APIs
                            • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00432D8F
                            • ___raise_securityfailure.LIBCMT ref: 00432E76
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: FeaturePresentProcessor___raise_securityfailure
                            • String ID: (F
                            • API String ID: 3761405300-3109638091
                            • Opcode ID: 8d70a3cd03553c2d68efa77227729d50617932ca87f7888c32547dfbcc783ade
                            • Instruction ID: 494dc9d0fce29d31cb3ef34e393fed80e8221b4646dfbf54f91bf1ae82b1ca01
                            • Opcode Fuzzy Hash: 8d70a3cd03553c2d68efa77227729d50617932ca87f7888c32547dfbcc783ade
                            • Instruction Fuzzy Hash: 8C21F0BD500205DEE700DF16E9856403BE4BB49314F20943AE9088B3A1F3F669918F9F
                            APIs
                            • GetLocalTime.KERNEL32(00000000), ref: 004194F4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: LocalTime
                            • String ID: | $%02i:%02i:%02i:%03i
                            • API String ID: 481472006-2430845779
                            • Opcode ID: a67c926593161fd0d94068773a7f546b8f59043c1d86e2b9fa0726e697ac87bd
                            • Instruction ID: bce8772fa89f7f7ff9e68bb522557632f538b64cb503c22793e2f51f4d03e72f
                            • Opcode Fuzzy Hash: a67c926593161fd0d94068773a7f546b8f59043c1d86e2b9fa0726e697ac87bd
                            • Instruction Fuzzy Hash: 68117F315042015AC304FBA5D8518EBB3E8AB94308F500A3FF895A21E2FF3CDA49C65A
                            APIs
                            • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0041209B
                            • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 004120D1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: QueryValue
                            • String ID: P0F
                            • API String ID: 3660427363-3540264436
                            • Opcode ID: c6eb32ecf86134c96b4320637183a1ff6d77c95426d782a482a776d7527dd5bc
                            • Instruction ID: 333f44122c6306c69f78a99928583bd7e211529a197e6eb40258ce4aa2bc4044
                            • Opcode Fuzzy Hash: c6eb32ecf86134c96b4320637183a1ff6d77c95426d782a482a776d7527dd5bc
                            • Instruction Fuzzy Hash: 5101DFB6A0010CBFEB14DB91DC06EFE7BBDEB48210F00017AFA04E2200E6B16F0096B4
                            APIs
                              • Part of subcall function 0040A0B0: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A0BE
                              • Part of subcall function 0040A0B0: wsprintfW.USER32 ref: 0040A13F
                              • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                            • CloseHandle.KERNEL32(?), ref: 00409FFD
                            • UnhookWindowsHookEx.USER32 ref: 0040A010
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                            • String ID: Online Keylogger Stopped
                            • API String ID: 1623830855-1496645233
                            • Opcode ID: 1d9df9307c6985c545f4644312b56fadd5f2e34dcb5750e21f19d435d86bc2cb
                            • Instruction ID: de94d33b988dbd75262e40483fa5bc1fa77a380ea8b62c1163629748a83ca489
                            • Opcode Fuzzy Hash: 1d9df9307c6985c545f4644312b56fadd5f2e34dcb5750e21f19d435d86bc2cb
                            • Instruction Fuzzy Hash: 2601F530A003045BD7257F24C81BBBE7BB59B82304F40056FE541225D2EAB91866E7DF
                            APIs
                              • Part of subcall function 00442D9A: EnterCriticalSection.KERNEL32(-0006A42D,?,004404DB,00000000,0046B4D8,0000000C,00440496,?,?,?,00443038,?,?,004457DA,00000001,00000364), ref: 00442DA9
                            • DeleteCriticalSection.KERNEL32(?,?,?,?,?,0046B780,00000010,0043A9DB), ref: 0044852C
                            • _free.LIBCMT ref: 0044853A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CriticalSection$DeleteEnter_free
                            • String ID: pUL
                            • API String ID: 1836352639-320214504
                            • Opcode ID: bf9b03ae5560feba4a6dffad266a5f0b3d53bc63c97ec9c6169899155bc6cddf
                            • Instruction ID: e4a66ad6b61ce482acc1b9e2cae33de82c0ba6a550a62ff3290d8f8c14ed10e3
                            • Opcode Fuzzy Hash: bf9b03ae5560feba4a6dffad266a5f0b3d53bc63c97ec9c6169899155bc6cddf
                            • Instruction Fuzzy Hash: C3111231540214AFE710EF99E846B5D73B0BF04715F50412AF891DB3A2DBB8D8458B0D
                            APIs
                              • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                              • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                              • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                              • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                            • _abort.LIBCMT ref: 0044C289
                            • _free.LIBCMT ref: 0044C2BD
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast_abort_free
                            • String ID: pF
                            • API String ID: 289325740-2973420481
                            • Opcode ID: 27a83d5959e399e126d66fc0e9bc80bad5e8b5edace6ebc33031c21e2b203fc3
                            • Instruction ID: 681b650f5022ba5d363f9e5fe3477a26ea07511fc4476d54e9c473318faef7cf
                            • Opcode Fuzzy Hash: 27a83d5959e399e126d66fc0e9bc80bad5e8b5edace6ebc33031c21e2b203fc3
                            • Instruction Fuzzy Hash: 2701CC75D02A319BE7B19F9A944165AB760BF04710B1D025BF96473381D7FC29418FCD
                            APIs
                            • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000,?,?,?,?,?,?,0040B5A1), ref: 0040B49A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExistsFilePath
                            • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                            • API String ID: 1174141254-2800177040
                            • Opcode ID: 7c111566f9d23feea8133a39eab31993fbffd75cee4a984a982c91c42cf678a0
                            • Instruction ID: 5821409638838460856efc798fa08f59aead72c028a5ec3eaf808f19191aee33
                            • Opcode Fuzzy Hash: 7c111566f9d23feea8133a39eab31993fbffd75cee4a984a982c91c42cf678a0
                            • Instruction Fuzzy Hash: CBF0547090021996CA04FBA6CC57DFF7B6CDA10715B40057FBA01721D3EEBC9E5586D9
                            APIs
                            • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000,?,?,?,?,?,?,0040B53E), ref: 0040B437
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExistsFilePath
                            • String ID: UserProfile$\AppData\Local\Google\Chrome\
                            • API String ID: 1174141254-4188645398
                            • Opcode ID: a90f53b3a105800d16b7b41f5beb6bf962e368042b2fd19f1224b6edd6f9c49f
                            • Instruction ID: 3f8b084fd7c06795b4d0fa8893062b22b44e731770192fac0e06baefb29df0f7
                            • Opcode Fuzzy Hash: a90f53b3a105800d16b7b41f5beb6bf962e368042b2fd19f1224b6edd6f9c49f
                            • Instruction Fuzzy Hash: 3DF08970A0021996CA04FBA6DC479FF7B6CDA10715B40007F7A01721D3EEBC9E498ADD
                            APIs
                            • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000,?,?,?,?,?,?,0040B604), ref: 0040B4FD
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExistsFilePath
                            • String ID: AppData$\Opera Software\Opera Stable\
                            • API String ID: 1174141254-1629609700
                            • Opcode ID: 69c88d561d4e5773074b3bc5cceffbd33c93e4cde49a943bdbb30454dde09397
                            • Instruction ID: 52471f63f703214977655dbdffc05bc1b666495b4e4508f2cd1aa44db4b955b6
                            • Opcode Fuzzy Hash: 69c88d561d4e5773074b3bc5cceffbd33c93e4cde49a943bdbb30454dde09397
                            • Instruction Fuzzy Hash: 2AF05430900219A6C604FBA6CC479EF7B6C9A50709B40047FB901722D3EEB99A4586DD
                            APIs
                            • GetKeyState.USER32(00000011), ref: 0040A597
                              • Part of subcall function 00409468: GetForegroundWindow.USER32(00472008,?,00472008), ref: 0040949C
                              • Part of subcall function 00409468: GetWindowThreadProcessId.USER32(00000000,?), ref: 004094A7
                              • Part of subcall function 00409468: GetKeyboardLayout.USER32(00000000), ref: 004094AE
                              • Part of subcall function 00409468: GetKeyState.USER32(00000010), ref: 004094B8
                              • Part of subcall function 00409468: GetKeyboardState.USER32(?), ref: 004094C5
                              • Part of subcall function 00409468: ToUnicodeEx.USER32(00000000,00000000,?,?,00000010,00000000,00000000), ref: 004094E1
                              • Part of subcall function 0040962E: SetEvent.KERNEL32(?,?,?,0040A77B,?,?,?,?,?,00000000), ref: 0040965A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: State$KeyboardWindow$EventForegroundLayoutProcessThreadUnicode
                            • String ID: [AltL]$[AltR]
                            • API String ID: 3195419117-2658077756
                            • Opcode ID: 95818baf887a83fbd095ba787890aaff40716197e7bc3e10cf8f15d14301b647
                            • Instruction ID: 29e442ca109236f59d068076b5b59df2bd5c1a98fb0e5871b2f0b43888bf59e1
                            • Opcode Fuzzy Hash: 95818baf887a83fbd095ba787890aaff40716197e7bc3e10cf8f15d14301b647
                            • Instruction Fuzzy Hash: E0E0E52170432026C828363E2D2B6AE39109741761B80006FF8436B2C6EC7E8D1043CF
                            APIs
                            • GetKeyState.USER32(00000012), ref: 0040A5F1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: State
                            • String ID: [CtrlL]$[CtrlR]
                            • API String ID: 1649606143-2446555240
                            • Opcode ID: 8632b80a32c9fa32f21b550938a6eee15c3a690095e5f6be671f0c8cc692680c
                            • Instruction ID: c9b4056729f6320a31326482d9effdd17bd0eb8d0dea22e3f8a852eb4ad5c27f
                            • Opcode Fuzzy Hash: 8632b80a32c9fa32f21b550938a6eee15c3a690095e5f6be671f0c8cc692680c
                            • Instruction Fuzzy Hash: 53E02672B043112AC414397E551EA2A286087917A9F46042FECC3672C3D87F8D2203CF
                            APIs
                            • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040BD02,00000000,?,00472200,pth_unenc,XIK), ref: 00412422
                            • RegDeleteValueW.ADVAPI32(?,?,?,00472200,pth_unenc,XIK), ref: 00412436
                            Strings
                            • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00412420
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: DeleteOpenValue
                            • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                            • API String ID: 2654517830-1051519024
                            • Opcode ID: 45be350e15fffb6ae5252e7309d7a4a092feaea6bf63e3a5136c94c60f555a57
                            • Instruction ID: b623b948bfdfa0337ccefb4abe002260ff2e01b184ebd3416e4b53d264740477
                            • Opcode Fuzzy Hash: 45be350e15fffb6ae5252e7309d7a4a092feaea6bf63e3a5136c94c60f555a57
                            • Instruction Fuzzy Hash: 9BE0C231244208BBDF108F71DE07FFA372CDB01F01F5042A5BD0592091C666CE149664
                            APIs
                              • Part of subcall function 004484CA: DeleteCriticalSection.KERNEL32(?,?,?,?,?,0046B780,00000010,0043A9DB), ref: 0044852C
                              • Part of subcall function 004484CA: _free.LIBCMT ref: 0044853A
                              • Part of subcall function 00448300: _free.LIBCMT ref: 00448322
                            • DeleteCriticalSection.KERNEL32(004C5550), ref: 0043A9F7
                            • _free.LIBCMT ref: 0043AA0B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: _free$CriticalDeleteSection
                            • String ID: pUL
                            • API String ID: 1906768660-320214504
                            • Opcode ID: e5ac36b3ed681d96bb29fb15252be59f85a39ae6aa6e3a5f4908a70822c1effc
                            • Instruction ID: d49f9847c972b922b2a5bd31cb464d080f037d7424c3f130f1981fc4ee97ab75
                            • Opcode Fuzzy Hash: e5ac36b3ed681d96bb29fb15252be59f85a39ae6aa6e3a5f4908a70822c1effc
                            • Instruction Fuzzy Hash: 7EE0D8328001109FD620BB5BFC4591A33E49F0D355B02443EFC85D3261DA79EC948B4E
                            APIs
                            • TerminateProcess.KERNEL32(00000000,XIK,0040E2B2), ref: 004112C5
                            • WaitForSingleObject.KERNEL32(000000FF), ref: 004112D8
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ObjectProcessSingleTerminateWait
                            • String ID: XIK
                            • API String ID: 1872346434-1566296654
                            • Opcode ID: 3250c3065a615e5fa00de520b6f6c814d77e8e8054cf58f577d93f1f98329294
                            • Instruction ID: b5655bab4260c8b751e52e8c7bcc6e4b5c94833391ebbdcfa87c891e0d6e2540
                            • Opcode Fuzzy Hash: 3250c3065a615e5fa00de520b6f6c814d77e8e8054cf58f577d93f1f98329294
                            • Instruction Fuzzy Hash: 3ED022301452009FEB001BB0BC08B003B68A708332F204372F9A2822F0D7F6D818AA1A
                            APIs
                            • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00433064
                              • Part of subcall function 00432FCD: std::exception::exception.LIBCONCRT ref: 00432FDA
                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00433072
                              • Part of subcall function 00436EC6: RaiseException.KERNEL32(?,?,00433057,?,?,?,00000000,?,?,?,P@,00433057,?,0046B09C,00000000), ref: 00436F25
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExceptionException@8RaiseThrowstd::exception::exceptionstd::invalid_argument::invalid_argument
                            • String ID: P@
                            • API String ID: 1586462112-676759640
                            • Opcode ID: d34f057b204cbc7e51539216932af2e5b0516ce62ca17289c65ad8c524a6b4fa
                            • Instruction ID: 0bfe0c8ac6dbc9b0d4453f7df384559b02cf33d5589a4338b6e2a72978291aeb
                            • Opcode Fuzzy Hash: d34f057b204cbc7e51539216932af2e5b0516ce62ca17289c65ad8c524a6b4fa
                            • Instruction Fuzzy Hash: 5CC08034C0020C77CB00F6E1C907C8D773C5D04300F405416B51091081E774531D96D5
                            APIs
                            • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00433044
                              • Part of subcall function 00432F76: std::exception::exception.LIBCONCRT ref: 00432F83
                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00433052
                              • Part of subcall function 00436EC6: RaiseException.KERNEL32(?,?,00433057,?,?,?,00000000,?,?,?,P@,00433057,?,0046B09C,00000000), ref: 00436F25
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExceptionException@8RaiseThrowstd::exception::exceptionstd::invalid_argument::invalid_argument
                            • String ID: P@
                            • API String ID: 1586462112-676759640
                            • Opcode ID: 0f635586152ab29110567b9c987066954b21ef4f476975f95e78209acc4c7d60
                            • Instruction ID: 865ee2ddef0a897f612f6fb2ad11127a6c44acc13293d016e759f8d59b40e8c3
                            • Opcode Fuzzy Hash: 0f635586152ab29110567b9c987066954b21ef4f476975f95e78209acc4c7d60
                            • Instruction Fuzzy Hash: 15C08034C0010CB7CB00FAF5D907D8E773C5904340F409015B61091041E7B8631C87C5
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: CommandLine
                            • String ID: 'J
                            • API String ID: 3253501508-2344650009
                            • Opcode ID: cae20f9730f5ace7650722f8577f4badf597048a844bd8defe5601c9d896c31e
                            • Instruction ID: ed7793de650037ca68a065bd14f32765b676cca72e00cc30cceafd45c2a83d08
                            • Opcode Fuzzy Hash: cae20f9730f5ace7650722f8577f4badf597048a844bd8defe5601c9d896c31e
                            • Instruction Fuzzy Hash: A8B092788007008FCB108FB0B80C0143BA0B6182073C15176DC8EC3F22E7758008DF09
                            APIs
                            • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D35), ref: 0043B4DB
                            • GetLastError.KERNEL32 ref: 0043B4E9
                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043B544
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ByteCharMultiWide$ErrorLast
                            • String ID:
                            • API String ID: 1717984340-0
                            • Opcode ID: 570887f611a5d1f74d34073c32c2f77717d7cd84bcf1f9b239cc9e46d00ed125
                            • Instruction ID: 0ecaebee41cb6558e50c6262f5020644a21471e748dd5a13caac6b8f2b864e38
                            • Opcode Fuzzy Hash: 570887f611a5d1f74d34073c32c2f77717d7cd84bcf1f9b239cc9e46d00ed125
                            • Instruction Fuzzy Hash: AD411630600205BFDB229F65D844B6B7BB4EF09328F14516EFA59AB3A1DB38CD01C799
                            APIs
                            • IsBadReadPtr.KERNEL32(?,00000014), ref: 004105F1
                            • IsBadReadPtr.KERNEL32(?,00000014), ref: 004106BD
                            • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004106DF
                            • SetLastError.KERNEL32(0000007E,00410955), ref: 004106F6
                            Memory Dump Source
                            • Source File: 00000000.00000002.3789865697.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3789851108.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789902446.0000000000456000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.000000000046E000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789921270.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3789949709.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_1728033125dd387fed0490e7ade394383eca6a3c5cb1fd0e94f8067e03fabd8e0d741c.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLastRead
                            • String ID:
                            • API String ID: 4100373531-0
                            • Opcode ID: 9879e5f97f9034714067de51e7f9b75c8f83f84791738768acf52853c1cf03dd
                            • Instruction ID: 0e21605053d2ba8273329305491efaf700724209343246308e891da9604144dc
                            • Opcode Fuzzy Hash: 9879e5f97f9034714067de51e7f9b75c8f83f84791738768acf52853c1cf03dd
                            • Instruction Fuzzy Hash: 73417C71644305DFE7208F18DC84BA7B7E4FF88714F00442EE54687691EBB5E8A5CB19